UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.3K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ ๐ˆ๐Ž๐“ ๐€๐๐ƒ ๐‡๐€๐‘๐ƒ๐–๐€๐‘๐„ ๐๐„๐๐“๐„๐’๐“ - ๐”๐๐ƒ๐€๐“๐„๐ƒ

#IoT and embedded devices are often used in critical infrastructure, such as healthcare devices or industrial control systems, which makes the security of these devices even more crucial.
๐Ÿ’ก๐‘ธ๐’–๐’Š๐’„๐’Œ ๐’“๐’†๐’Ž๐’Š๐’๐’…๐’†๐’“
Hardware refers to the physical components of a computer system or electronic device, while IoT refers to the network of connected devices that can communicate with each other over the internet.
While there is overlap between these concepts, they refer to different aspects of computer and electronic systems.

๐Ÿ‘‰ ๐‡๐จ๐ฐ ๐ญ๐จ ๐›๐ž๐ ๐ข๐ง?
๐ŸŒŸ A Red Team Guide for a Hardware Penetration Test by Adam Toscher
โญPart 1: https://lnkd.in/eRUtq6Ne
โญPart 2: https://lnkd.in/ezjwNuP6

๐ŸŒŸHardware Hacking Curiosity by ๐Ÿ‘บ Adrien Lasalle
https://lnkd.in/eeDp-iq6

๐ŸŒŸ IoT Security 101 by V33RU
https://lnkd.in/eZ2QGhdJ

๐ŸŒŸ Awesome Hardware Hacking and IoT by Joas A Santos
https://lnkd.in/eyXnbKBv

๐ŸŒŸ IoT Village youtube channel
https://lnkd.in/eHEuww7w

๐ŸŒŸ UART Hardware Hacking Cheat Sheet by Marcel Rick-Cen
https://lnkd.in/edpyHG2B

๐ŸŒŸIoT Pentesting guide by Aditya Gupta and Attify
https://lnkd.in/ekBmcSNd

๐ŸŒŸ IoT Security Resources for beginner by Nayana Dhanesh
https://lnkd.in/eAmTvWnj

๐ŸŒŸ Firmware analysis on HackTricks
https://lnkd.in/eUvMqtAZ

๐Ÿ‘‰ ๐…๐ž๐ž๐ฅ๐ข๐ง๐  ๐ซ๐ž๐š๐๐ฒ ๐ญ๐จ ๐ญ๐ซ๐š๐ข๐ง?
๐ŸŒŸ Open Security Training
https://p.ost2.fyi/

๐ŸŒŸ Hackaday courses
https://lnkd.in/e3yhaZTB

๐ŸŒŸ Intro to IoT pentest on TryHackMe
https://lnkd.in/ewjUM-Tc

๐Ÿ‘‰ ๐’๐จ๐ฆ๐ž ๐ข๐ง๐ญ๐ž๐ซ๐ž๐ฌ๐ญ๐ข๐ง๐  ๐ซ๐ž๐š๐๐ฌ
๐ŸŒŸ IOT Security Foundation
https://lnkd.in/ecGudjgn

๐ŸŒŸ Awesome IoT Hacks by nebgnahz
https://lnkd.in/eQk4UBrt

๐ŸŒŸ Hands on Internet of things hacking by Payatu
https://lnkd.in/eqEEJriu

๐Ÿ‘‰ ๐“๐Ž๐Ž๐‹๐’ ๐€๐๐ƒ ๐‘๐„๐’๐Ž๐”๐‘๐‚๐„๐’
๐ŸŒŸ Scared by eshard - side-channel analysis framework
https://lnkd.in/eZhb_we3

๐ŸŒŸNewAE Technology Inc.โ€™s Github repo
https://lnkd.in/eiuZDCfb

๐ŸŒŸLedger Donjonโ€™s repo by Ledger Security research team
https://lnkd.in/eEhA4FMh

๐ŸŒŸIoT-PT an OS for IoT pentest by v33ru
https://lnkd.in/evuB7X_Z

๐Ÿ‘‰ ๐–๐ก๐š๐ญ ๐š๐›๐จ๐ฎ๐ญ ๐ญ๐ก๐ž ๐ฌ๐ญ๐š๐ง๐๐š๐ซ๐๐ฌ?
๐ŸŒŸ The OWASPยฎ Foundation IoT Project:
https://lnkd.in/ev7TrRf9

๐ŸŒŸ NIST Cybersecurity for IOT Program
https://lnkd.in/eq8k8BwG

๐ŸŒŸ Hardware Security Module NIST
https://lnkd.in/eXcGvAwV

โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE TESTING
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘ Support & Share: t.me/undercodecommunity

This is the hub for Ethical Hackers and tech enthusiasts:

ใ€‹Topics We Cover:

1๏ธโƒฃ CVE News & Databases

2๏ธโƒฃ Hacker & Tech News

3๏ธโƒฃ Cybersecurity, Hacking, and Secret Methods

๐ŸŒŸ Our Mission:
Share your knowledge, collaborate, and grow together in a community designed for innovation and learning.

๐Ÿ”— Join now: bit.ly/joinundercode

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE TESTING
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘Popular Exploit development library:

ใ€‹Pwntools (https://github.com/Gallopsled/pwntools) is a popular CTF (Capture The Flag) framework and exploit development library written in Python. It provides tools and features that streamline the process of writing, testing, and executing exploits, especially for binary exploitation challenges.

Key Features:

- Automated Exploit Scripts**: Easily interact with remote or local binaries.

- ROP (Return Oriented Programming): Simplifies creating ROP chains.

- Tubes: Abstraction for handling sockets, SSH, or processes.
- Assembler/Disassembler: Integrates tools like Capstone and Keystone.

- Debugging Utilities: Interfaces with GDB for dynamic analysis.

- Custom Shellcodes: Generate shellcode tailored to your needs.

Requirements:
Pwntools is compatible with Python 3 and can be installed via pip:

pip install pwntools
Example Usage:
Hereโ€™s a basic example of using Pwntools to exploit a binary:
from pwn import *

# Connect to the remote service
conn = remote('example.com', 1337)

# Send payload
payload = b'A' * 64 + b'\xdeadbeef'
conn.sendline(payload)

# Interact with the shell
conn.interactive()
Check out the repository for detailed documentation and examples.

โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–

๐Ÿฆ‘C++ scanner that retrieves tuples from a PostgreSQL database and scans them for malware:

Hereโ€™s a simple C++ scanner that connects to a PostgreSQL database to retrieve tuples and checks them for malware. In this example, I'll assume the tuples are strings that need to be compared against a predefined list of known malware signatures.

- Security: This example does not implement secure credential handling (such as using a .pgpass file) and lacks measures to protect against SQL injection.

- Malware Detection: The method for detecting malware here is quite basic. In a real application, you would want to employ more advanced techniques, potentially involving hash checks against a comprehensive database of malware signatures.

- Error Handling: Itโ€™s important to include proper error handling for code intended for production use.

- Dependencies: Make sure you have the libpqxx library installed, which provides the C++ API for PostgreSQL.

Ref: Maximilian Feldthusen
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–