Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โก๏ธ #WhatsApp Beta Gets a New Feature: Forward to Meta #AI
https://undercodenews.com/whatsapp-beta-gets-a-new-feature-forward-to-meta-ai/
@Undercode_News
https://undercodenews.com/whatsapp-beta-gets-a-new-feature-forward-to-meta-ai/
@Undercode_News
UNDERCODE NEWS
WhatsApp Beta Gets a New Feature: Forward to Meta AI - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from Exploiting Crew (Pr1vAt3)
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ ๐๐๐ ๐๐๐ ๐๐๐๐๐๐๐๐ ๐๐๐๐๐๐๐ - ๐๐๐๐๐๐๐
#IoT and embedded devices are often used in critical infrastructure, such as healthcare devices or industrial control systems, which makes the security of these devices even more crucial.
๐ก๐ธ๐๐๐๐ ๐๐๐๐๐๐ ๐๐
Hardware refers to the physical components of a computer system or electronic device, while IoT refers to the network of connected devices that can communicate with each other over the internet.
While there is overlap between these concepts, they refer to different aspects of computer and electronic systems.
๐ ๐๐จ๐ฐ ๐ญ๐จ ๐๐๐ ๐ข๐ง?
๐ A Red Team Guide for a Hardware Penetration Test by Adam Toscher
โญPart 1: https://lnkd.in/eRUtq6Ne
โญPart 2: https://lnkd.in/ezjwNuP6
๐Hardware Hacking Curiosity by ๐บ Adrien Lasalle
https://lnkd.in/eeDp-iq6
๐ IoT Security 101 by V33RU
https://lnkd.in/eZ2QGhdJ
๐ Awesome Hardware Hacking and IoT by Joas A Santos
https://lnkd.in/eyXnbKBv
๐ IoT Village youtube channel
https://lnkd.in/eHEuww7w
๐ UART Hardware Hacking Cheat Sheet by Marcel Rick-Cen
https://lnkd.in/edpyHG2B
๐IoT Pentesting guide by Aditya Gupta and Attify
https://lnkd.in/ekBmcSNd
๐ IoT Security Resources for beginner by Nayana Dhanesh
https://lnkd.in/eAmTvWnj
๐ Firmware analysis on HackTricks
https://lnkd.in/eUvMqtAZ
๐ ๐ ๐๐๐ฅ๐ข๐ง๐ ๐ซ๐๐๐๐ฒ ๐ญ๐จ ๐ญ๐ซ๐๐ข๐ง?
๐ Open Security Training
https://p.ost2.fyi/
๐ Hackaday courses
https://lnkd.in/e3yhaZTB
๐ Intro to IoT pentest on TryHackMe
https://lnkd.in/ewjUM-Tc
๐ ๐๐จ๐ฆ๐ ๐ข๐ง๐ญ๐๐ซ๐๐ฌ๐ญ๐ข๐ง๐ ๐ซ๐๐๐๐ฌ
๐ IOT Security Foundation
https://lnkd.in/ecGudjgn
๐ Awesome IoT Hacks by nebgnahz
https://lnkd.in/eQk4UBrt
๐ Hands on Internet of things hacking by Payatu
https://lnkd.in/eqEEJriu
๐ ๐๐๐๐๐ ๐๐๐ ๐๐๐๐๐๐๐๐๐
๐ Scared by eshard - side-channel analysis framework
https://lnkd.in/eZhb_we3
๐NewAE Technology Inc.โs Github repo
https://lnkd.in/eiuZDCfb
๐Ledger Donjonโs repo by Ledger Security research team
https://lnkd.in/eEhA4FMh
๐IoT-PT an OS for IoT pentest by v33ru
https://lnkd.in/evuB7X_Z
๐ ๐๐ก๐๐ญ ๐๐๐จ๐ฎ๐ญ ๐ญ๐ก๐ ๐ฌ๐ญ๐๐ง๐๐๐ซ๐๐ฌ?
๐ The OWASPยฎ Foundation IoT Project:
https://lnkd.in/ev7TrRf9
๐ NIST Cybersecurity for IOT Program
https://lnkd.in/eq8k8BwG
๐ Hardware Security Module NIST
https://lnkd.in/eXcGvAwV
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ ๐๐๐ ๐๐๐ ๐๐๐๐๐๐๐๐ ๐๐๐๐๐๐๐ - ๐๐๐๐๐๐๐
#IoT and embedded devices are often used in critical infrastructure, such as healthcare devices or industrial control systems, which makes the security of these devices even more crucial.
๐ก๐ธ๐๐๐๐ ๐๐๐๐๐๐ ๐๐
Hardware refers to the physical components of a computer system or electronic device, while IoT refers to the network of connected devices that can communicate with each other over the internet.
While there is overlap between these concepts, they refer to different aspects of computer and electronic systems.
๐ ๐๐จ๐ฐ ๐ญ๐จ ๐๐๐ ๐ข๐ง?
๐ A Red Team Guide for a Hardware Penetration Test by Adam Toscher
โญPart 1: https://lnkd.in/eRUtq6Ne
โญPart 2: https://lnkd.in/ezjwNuP6
๐Hardware Hacking Curiosity by ๐บ Adrien Lasalle
https://lnkd.in/eeDp-iq6
๐ IoT Security 101 by V33RU
https://lnkd.in/eZ2QGhdJ
๐ Awesome Hardware Hacking and IoT by Joas A Santos
https://lnkd.in/eyXnbKBv
๐ IoT Village youtube channel
https://lnkd.in/eHEuww7w
๐ UART Hardware Hacking Cheat Sheet by Marcel Rick-Cen
https://lnkd.in/edpyHG2B
๐IoT Pentesting guide by Aditya Gupta and Attify
https://lnkd.in/ekBmcSNd
๐ IoT Security Resources for beginner by Nayana Dhanesh
https://lnkd.in/eAmTvWnj
๐ Firmware analysis on HackTricks
https://lnkd.in/eUvMqtAZ
๐ ๐ ๐๐๐ฅ๐ข๐ง๐ ๐ซ๐๐๐๐ฒ ๐ญ๐จ ๐ญ๐ซ๐๐ข๐ง?
๐ Open Security Training
https://p.ost2.fyi/
๐ Hackaday courses
https://lnkd.in/e3yhaZTB
๐ Intro to IoT pentest on TryHackMe
https://lnkd.in/ewjUM-Tc
๐ ๐๐จ๐ฆ๐ ๐ข๐ง๐ญ๐๐ซ๐๐ฌ๐ญ๐ข๐ง๐ ๐ซ๐๐๐๐ฌ
๐ IOT Security Foundation
https://lnkd.in/ecGudjgn
๐ Awesome IoT Hacks by nebgnahz
https://lnkd.in/eQk4UBrt
๐ Hands on Internet of things hacking by Payatu
https://lnkd.in/eqEEJriu
๐ ๐๐๐๐๐ ๐๐๐ ๐๐๐๐๐๐๐๐๐
๐ Scared by eshard - side-channel analysis framework
https://lnkd.in/eZhb_we3
๐NewAE Technology Inc.โs Github repo
https://lnkd.in/eiuZDCfb
๐Ledger Donjonโs repo by Ledger Security research team
https://lnkd.in/eEhA4FMh
๐IoT-PT an OS for IoT pentest by v33ru
https://lnkd.in/evuB7X_Z
๐ ๐๐ก๐๐ญ ๐๐๐จ๐ฎ๐ญ ๐ญ๐ก๐ ๐ฌ๐ญ๐๐ง๐๐๐ซ๐๐ฌ?
๐ The OWASPยฎ Foundation IoT Project:
https://lnkd.in/ev7TrRf9
๐ NIST Cybersecurity for IOT Program
https://lnkd.in/eq8k8BwG
๐ Hardware Security Module NIST
https://lnkd.in/eXcGvAwV
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE TESTING
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Support & Share: t.me/undercodecommunity
This is the hub for Ethical Hackers and tech enthusiasts:
ใTopics We Cover:
1๏ธโฃ CVE News & Databases
2๏ธโฃ Hacker & Tech News
3๏ธโฃ Cybersecurity, Hacking, and Secret Methods
๐ Our Mission:
Share your knowledge, collaborate, and grow together in a community designed for innovation and learning.
๐ Join now: bit.ly/joinundercode
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆ Support & Share: t.me/undercodecommunity
This is the hub for Ethical Hackers and tech enthusiasts:
ใTopics We Cover:
1๏ธโฃ CVE News & Databases
2๏ธโฃ Hacker & Tech News
3๏ธโฃ Cybersecurity, Hacking, and Secret Methods
๐ Our Mission:
Share your knowledge, collaborate, and grow together in a community designed for innovation and learning.
๐ Join now: bit.ly/joinundercode
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE TESTING
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆPopular Exploit development library:
ใPwntools (https://github.com/Gallopsled/pwntools) is a popular CTF (Capture The Flag) framework and exploit development library written in Python. It provides tools and features that streamline the process of writing, testing, and executing exploits, especially for binary exploitation challenges.
Key Features:
- Automated Exploit Scripts**: Easily interact with remote or local binaries.
- ROP (Return Oriented Programming): Simplifies creating ROP chains.
- Tubes: Abstraction for handling sockets, SSH, or processes.
- Assembler/Disassembler: Integrates tools like Capstone and Keystone.
- Debugging Utilities: Interfaces with GDB for dynamic analysis.
- Custom Shellcodes: Generate shellcode tailored to your needs.
Requirements:
Pwntools is compatible with Python 3 and can be installed via pip:
pip install pwntools
Example Usage:
Hereโs a basic example of using Pwntools to exploit a binary:
from pwn import *
# Connect to the remote service
conn = remote('example.com', 1337)
# Send payload
payload = b'A' * 64 + b'\xdeadbeef'
conn.sendline(payload)
# Interact with the shell
conn.interactive()
Check out the repository for detailed documentation and examples.
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆPopular Exploit development library:
ใPwntools (https://github.com/Gallopsled/pwntools) is a popular CTF (Capture The Flag) framework and exploit development library written in Python. It provides tools and features that streamline the process of writing, testing, and executing exploits, especially for binary exploitation challenges.
Key Features:
- Automated Exploit Scripts**: Easily interact with remote or local binaries.
- ROP (Return Oriented Programming): Simplifies creating ROP chains.
- Tubes: Abstraction for handling sockets, SSH, or processes.
- Assembler/Disassembler: Integrates tools like Capstone and Keystone.
- Debugging Utilities: Interfaces with GDB for dynamic analysis.
- Custom Shellcodes: Generate shellcode tailored to your needs.
Requirements:
Pwntools is compatible with Python 3 and can be installed via pip:
pip install pwntools
Example Usage:
Hereโs a basic example of using Pwntools to exploit a binary:
from pwn import *
# Connect to the remote service
conn = remote('example.com', 1337)
# Send payload
payload = b'A' * 64 + b'\xdeadbeef'
conn.sendline(payload)
# Interact with the shell
conn.interactive()
Check out the repository for detailed documentation and examples.
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
GitHub
GitHub - Gallopsled/pwntools: CTF framework and exploit development library
CTF framework and exploit development library. Contribute to Gallopsled/pwntools development by creating an account on GitHub.
Forwarded from Exploiting Crew (Pr1vAt3)
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆC++ scanner that retrieves tuples from a PostgreSQL database and scans them for malware:
Hereโs a simple C++ scanner that connects to a PostgreSQL database to retrieve tuples and checks them for malware. In this example, I'll assume the tuples are strings that need to be compared against a predefined list of known malware signatures.
- Security: This example does not implement secure credential handling (such as using a .pgpass file) and lacks measures to protect against SQL injection.
- Malware Detection: The method for detecting malware here is quite basic. In a real application, you would want to employ more advanced techniques, potentially involving hash checks against a comprehensive database of malware signatures.
- Error Handling: Itโs important to include proper error handling for code intended for production use.
- Dependencies: Make sure you have the libpqxx library installed, which provides the C++ API for PostgreSQL.
Ref: Maximilian Feldthusen
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆC++ scanner that retrieves tuples from a PostgreSQL database and scans them for malware:
Hereโs a simple C++ scanner that connects to a PostgreSQL database to retrieve tuples and checks them for malware. In this example, I'll assume the tuples are strings that need to be compared against a predefined list of known malware signatures.
- Security: This example does not implement secure credential handling (such as using a .pgpass file) and lacks measures to protect against SQL injection.
- Malware Detection: The method for detecting malware here is quite basic. In a real application, you would want to employ more advanced techniques, potentially involving hash checks against a comprehensive database of malware signatures.
- Error Handling: Itโs important to include proper error handling for code intended for production use.
- Dependencies: Make sure you have the libpqxx library installed, which provides the C++ API for PostgreSQL.
Ref: Maximilian Feldthusen
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ A Year Later: #Tesla Sweden Defies Blockades, Leaving Unions Frustrated
https://undercodenews.com/a-year-later-tesla-sweden-defies-blockades-leaving-unions-frustrated/
@Undercode_News
https://undercodenews.com/a-year-later-tesla-sweden-defies-blockades-leaving-unions-frustrated/
@Undercode_News
UNDERCODE NEWS
A Year Later: Tesla Sweden Defies Blockades, Leaving Unions Frustrated - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ค Smart TV Automation with Modes and Routines: Elevate Your Viewing Experience
https://undercodenews.com/smart-tv-automation-with-modes-and-routines-elevate-your-viewing-experience/
@Undercode_News
https://undercodenews.com/smart-tv-automation-with-modes-and-routines-elevate-your-viewing-experience/
@Undercode_News
UNDERCODE NEWS
Smart TV Automation with Modes and Routines: Elevate Your Viewing Experience - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from DailyCVE
๐ Wazifa System 10: Cross-Site Scripting (XSS), #CVE-2024-12001 (MEDIUM)
https://dailycve.com/wazifa-system-10-cross-site-scripting-xss-cve-2024-12001-medium/
@DailyCVE
https://dailycve.com/wazifa-system-10-cross-site-scripting-xss-cve-2024-12001-medium/
@DailyCVE
DailyCVE
Wazifa System 10: Cross-Site Scripting (XSS), CVE-2024-12001 (MEDIUM) - DailyCVE
2024-12-11 : A medium severity cross-site scripting (XSS) vulnerability (CVE-2024-12001) has been identified in Wazifa System 1.0. This vulnerability affects [โฆ]
Forwarded from DailyCVE
๐ด 1000 Projects Library Management System 10, SQL Injection, #CVE-2024-12188 (Critical)
https://dailycve.com/1000-projects-library-management-system-10-sql-injection-cve-2024-12188-critical/
@Daily_CVE
https://dailycve.com/1000-projects-library-management-system-10-sql-injection-cve-2024-12188-critical/
@Daily_CVE
DailyCVE
1000 Projects Library Management System 10, SQL Injection, CVE-2024-12188 (Critical) - DailyCVE
2024-12-11 : A critical SQL injection vulnerability (CVE-2024-12188) has been identified in 1000 Projects Library Management System version 1.0. This [โฆ]
Forwarded from DailyCVE
๐ด PHPGurukul Complaint Management System 10: Critical SQL Injection (#CVE-2024-12230)
https://dailycve.com/phpgurukul-complaint-management-system-10-critical-sql-injection-cve-2024-12230/
@Daily_CVE
https://dailycve.com/phpgurukul-complaint-management-system-10-critical-sql-injection-cve-2024-12230/
@Daily_CVE
DailyCVE
PHPGurukul Complaint Management System 10: Critical SQL Injection (CVE-2024-12230) - DailyCVE
2024-12-11 : A critical SQL injection vulnerability (CVE-2024-12230) has been identified in PHPGurukul Complaint Management System version 1.0. This vulnerability [โฆ]
Forwarded from DailyCVE
๐ด WeiYe-Jing datax-web 211: Remote Code Execution (#CVE-2024-12358) - Critical
https://dailycve.com/weiye-jing-datax-web-211-remote-code-execution-cve-2024-12358-critical/
@Daily_CVE
https://dailycve.com/weiye-jing-datax-web-211-remote-code-execution-cve-2024-12358-critical/
@Daily_CVE
DailyCVE
WeiYe-Jing datax-web 211: Remote Code Execution (CVE-2024-12358) - Critical - DailyCVE
2024-12-11 : A critical vulnerability (CVE-2024-12358) exists in WeiYe-Jing datax-web version 2.1.1. This vulnerability allows remote attackers to execute arbitrary [โฆ]
Forwarded from DailyCVE
๐ด TP-Link VN020 F3v(T) SOAP Request Handler Buffer Overflow (#CVE-2024-12343) - Critical
https://dailycve.com/tp-link-vn020-f3vt-soap-request-handler-buffer-overflow-cve-2024-12343-critical/
@Daily_CVE
https://dailycve.com/tp-link-vn020-f3vt-soap-request-handler-buffer-overflow-cve-2024-12343-critical/
@Daily_CVE
DailyCVE
TP-Link VN020 F3v(T) SOAP Request Handler Buffer Overflow (CVE-2024-12343) - Critical - DailyCVE
2024-12-11 Vulnerability : A critical vulnerability exists in TP-Link VN020 F3v(T) routers running firmware version TT_V6.2.1021. This vulnerability affects an [โฆ]
Forwarded from DailyCVE
๐ด Online Class and Exam Scheduling System 10, SQL Injection, #CVE-2024-12360 (Critical)
https://dailycve.com/online-class-and-exam-scheduling-system-10-sql-injection-cve-2024-12360-critical/
@Daily_CVE
https://dailycve.com/online-class-and-exam-scheduling-system-10-sql-injection-cve-2024-12360-critical/
@Daily_CVE
DailyCVE
Online Class and Exam Scheduling System 10, SQL Injection, CVE-2024-12360 (Critical) - DailyCVE
2024-12-11 : A critical SQL injection vulnerability (CVE-2024-12360) has been identified in Online Class and Exam Scheduling System version 1.0. [โฆ]
Forwarded from DailyCVE
๐ TOTOLINK EX1800T Stack Overflow Vulnerability (#CVE-2024-12352) - Medium
https://dailycve.com/totolink-ex1800t-stack-overflow-vulnerability-cve-2024-12352-medium/
@Daily_CVE
https://dailycve.com/totolink-ex1800t-stack-overflow-vulnerability-cve-2024-12352-medium/
@Daily_CVE
DailyCVE
TOTOLINK EX1800T Stack Overflow Vulnerability (CVE-2024-12352) - Medium - DailyCVE
2024-12-11 A security vulnerability (CVE-2024-12352) has been identified in TOTOLINK EX1800T routers running firmware version 9.1.0cu.2112_B20220316. This vulnerability is classified [โฆ]
Forwarded from DailyCVE
๐ด Online Notice Board Unrestricted Upload Vulnerability (#CVE-2024-12233 - Critical)
https://dailycve.com/online-notice-board-unrestricted-upload-vulnerability-cve-2024-12233-critical/
@Daily_CVE
https://dailycve.com/online-notice-board-unrestricted-upload-vulnerability-cve-2024-12233-critical/
@Daily_CVE
DailyCVE
Online Notice Board Unrestricted Upload Vulnerability (CVE-2024-12233 - Critical) - DailyCVE
2024-12-11 : A critical vulnerability (CVE-2024-12233) exists in code-projects Online Notice Board version 1.0. This vulnerability allows attackers to upload [โฆ]
Forwarded from DailyCVE
๐ SourceCodester Phone Contact Manager System 10, Improper Input Validation, #CVE-2024-12353 (Medium)
https://dailycve.com/sourcecodester-phone-contact-manager-system-10-improper-input-validation-cve-2024-12353-medium/
@Daily_CVE
https://dailycve.com/sourcecodester-phone-contact-manager-system-10-improper-input-validation-cve-2024-12353-medium/
@Daily_CVE
DailyCVE
SourceCodester Phone Contact Manager System 10, Improper Input Validation, CVE-2024-12353 (Medium) - DailyCVE
2024-12-11 : A security vulnerability (CVE-2024-12353) has been identified in SourceCodester Phone Contact Manager System 1.0. This vulnerability affects the [โฆ]
Forwarded from DailyCVE
๐ด PHPGurukul Complaint Management System 10: Critical SQL Injection (#CVE-2024-12228)
https://dailycve.com/phpgurukul-complaint-management-system-10-critical-sql-injection-cve-2024-12228/
@Daily_CVE
https://dailycve.com/phpgurukul-complaint-management-system-10-critical-sql-injection-cve-2024-12228/
@Daily_CVE
DailyCVE
PHPGurukul Complaint Management System 10: Critical SQL Injection (CVE-2024-12228) - DailyCVE
2024-12-11 : A critical SQL injection vulnerability (CVE-2024-12228) has been identified in PHPGurukul Complaint Management System version 1.0. This vulnerability [โฆ]
Forwarded from DailyCVE
๐ด SourceCodester Petrol Pump Management #Software 10 Unrestricted File Upload (#CVE-2024-2059) - Critical
https://dailycve.com/sourcecodester-petrol-pump-management-software-10-unrestricted-file-upload-cve-2024-2059-critical/
@Daily_CVE
https://dailycve.com/sourcecodester-petrol-pump-management-software-10-unrestricted-file-upload-cve-2024-2059-critical/
@Daily_CVE
DailyCVE
SourceCodester Petrol Pump Management Software 10 Unrestricted File Upload (CVE-2024-2059) - Critical - DailyCVE
2024-12-11 : A critical vulnerability (CVE-2024-2059) exists in SourceCodester Petrol Pump Management Software 1.0. This vulnerability allows attackers to upload [โฆ]
Forwarded from DailyCVE
๐ SourceCodester Best House Rental Management System 10, File Inclusion Vulnerability, #CVE-2024-12357 (Medium)
https://dailycve.com/sourcecodester-best-house-rental-management-system-10-file-inclusion-vulnerability-cve-2024-12357-medium/
@Daily_CVE
https://dailycve.com/sourcecodester-best-house-rental-management-system-10-file-inclusion-vulnerability-cve-2024-12357-medium/
@Daily_CVE
DailyCVE
SourceCodester Best House Rental Management System 10, File Inclusion Vulnerability, CVE-2024-12357 (Medium) - DailyCVE
2024-12-11 : A vulnerability (CVE-2024-12357) exists in SourceCodester Best House Rental Management System 1.0. This vulnerability allows for remote file [โฆ]