UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
๐Ÿฆ‘ Undercode Cyber World!
@UndercodeCommunity


1๏ธโƒฃ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2๏ธโƒฃ Cyber & Tech NEWS:
@Undercode_News

3๏ธโƒฃ CVE @Daily_CVE

โœจ Web & Services:
โ†’ Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘๐‡๐จ๐ฐ ๐ƒ๐จ๐ž๐ฌ ๐š ๐–๐€๐… ๐ฐ๐จ๐ซ๐ค?
A Web Application Firewall (WAF) functions by monitoring and filtering HTTP/HTTPS traffic to and from web applications.

๐Š๐ž๐ฒ ๐จ๐ฉ๐ž๐ซ๐š๐ญ๐ข๐จ๐ง๐š๐ฅ ๐œ๐จ๐ฆ๐ฉ๐จ๐ง๐ž๐ง๐ญ๐ฌ ๐ข๐ง๐œ๐ฅ๐ฎ๐๐ž: -

๐“๐ซ๐š๐Ÿ๐Ÿ๐ข๐œ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ข๐ฌ: It scrutinizes incoming and outgoing requests to pinpoint anomalies or potential threats.

๐‘๐ฎ๐ฅ๐ž ๐„๐ง๐Ÿ๐จ๐ซ๐œ๐ž๐ฆ๐ž๐ง๐ญ: Predefined rulesets are applied to identify and mitigate malicious activity. Analytical techniques employed by a WAF encompass:

๐๐ฅ๐š๐œ๐ค๐ฅ๐ข๐ฌ๐ญ๐ข๐ง๐ : This approach blocks requests from known malicious IP addresses, preventing unauthorized access.

๐–๐ก๐ข๐ญ๐ž๐ฅ๐ข๐ฌ๐ญ๐ข๐ง๐ : Only explicitly approved requests are allowed through, enhancing security by default.

๐’๐ข๐ ๐ง๐š๐ญ๐ฎ๐ซ๐ž-๐๐š๐ฌ๐ž๐ ๐ƒ๐ž๐ญ๐ž๐œ๐ญ๐ข๐จ๐ง**This method involves recognizing established attack patterns based on known signatures.

**๐๐ž๐ก๐š๐ฏ๐ข๐จ๐ซ๐š๐ฅ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ข๐ฌ
: Leveraging machine learning algorithms, the WAF can identify suspicious behaviors that may deviate from normal activity. Unlike traditional antivirus solutions that rely solely on signature detection,
WAFs utilize more sophisticated detection mechanisms.

๐Ž๐ง๐œ๐ž ๐ญ๐ก๐ซ๐ž๐š๐ญ๐ฌ ๐š๐ซ๐ž ๐๐ž๐ญ๐ž๐œ๐ญ๐ž๐, ๐ญ๐ก๐ž ๐–๐€๐… ๐ข๐ฆ๐ฉ๐ฅ๐ž๐ฆ๐ž๐ง๐ญ๐ฌ ๐ญ๐ก๐ž ๐Ÿ๐จ๐ฅ๐ฅ๐จ๐ฐ๐ข๐ง๐  ๐ฆ๐ž๐š๐ฌ๐ฎ๐ซ๐ž๐ฌ:

๐‘๐ž๐ช๐ฎ๐ž๐ฌ๐ญ ๐๐ฅ๐จ๐œ๐ค๐ข๐ง๐ : Directly halting any identified malicious requests.

๐„๐ฏ๐ž๐ง๐ญ ๐‹๐จ๐ ๐ ๐ข๐ง๐ : Recording incidents for further investigation and analysis, facilitating continued improvement of security postures.

Image credit: Cyber Edition
Ref: Praveen Singh

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE TESTING
๐Ÿฆ‘ Free New Threat Hunting Resources Added! ๐Ÿšจ

๐Ÿ” What's New?

1๏ธโƒฃ Advanced Threat Hunting Queries (hashtag#KQL):
- Identify and monitor vulnerable assets for Known Exploited Vulnerabilities (hashtag#KEVs) by ransomware groups.
- Attack Vector: Network | Privileges Required: None

> Download <

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘๐‚๐ฒ๐›๐ž๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐œ๐š๐ซ๐ž๐ž๐ซ๐ฌ ๐๐š๐ญ๐ก.

1) Security certification roadmap https://lnkd.in/ghvqfZ3z & https://lnkd.in/eFU8WC29

2) Domains of cyber security https://lnkd.in/eXsfxkTs

3) Cyber career map https://lnkd.in/evTUCgas

4) Cyber career map https://dsci.in

Suggestion on how to use these: ask yourself
๐Ÿ‘‰ What domain of security interests you (offensive? Policy? Defence?),
๐Ÿ‘‰ What job you want (pentester? CISO?),
๐Ÿ‘‰ What certifications you might need (OSCP? CEH?)
๐Ÿ‘‰ What level they are at, build up a plan of how to get there?
Thank you Katie Paxton-Fear for nice sharing.

Ref: G M Faruk Ahmed, CISSP, CISA

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–