Forwarded from Exploiting Crew (Pr1vAt3)
π¦ Troubleshooting OSPFv2 Neighbor Adjacencies Made Easy! π
Are your OSPFv2 neighbors stuck in states like Init, 2-Way, or ExStart? Troubleshooting OSPF can be tricky, but with the right approach, you can resolve issues quickly! Here's a checklist to help:
β 1. Check Network Types
Ensure both devices are on the same network type (Broadcast, Point-to-Point, Non-Broadcast, etc.). A mismatch could lead to adjacency issues.
β 2. Verify Subnet Masks
Neighbors must share the same subnet. Run show ip ospf interface to confirm.
β 3. Confirm Hello and Dead Timers
Default timers should match. Use show ip ospf neighbor to check compatibility.
β 4. Authentication Configurations
Is OSPF authentication enabled? Double-check the keys and methods (Plaintext/MD5).
β 5. MTU Mismatch
A mismatch in MTU can cause neighbors to get stuck in ExStart. Use ip ospf mtu-ignore if necessary.
β 6. Router IDs
Each router must have a unique Router ID. Conflicts can disrupt adjacencies.
β 7. Passive Interfaces
Is OSPF accidentally configured as passive on the neighbor-facing interface? Check your configs!
β 8. Access-Lists or Firewalls
Ensure UDP packets on ports 520 and 89 aren't blocked by ACLs or firewalls.
Troubleshooting OSPF is all about systematic checks and leveraging show/debug commands. Here's my golden rule: Start from Layer 1 and move up!
π‘ Whatβs your go-to step when troubleshooting OSPF adjacencies?
Ref: Sumit Kashyap
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Are your OSPFv2 neighbors stuck in states like Init, 2-Way, or ExStart? Troubleshooting OSPF can be tricky, but with the right approach, you can resolve issues quickly! Here's a checklist to help:
β 1. Check Network Types
Ensure both devices are on the same network type (Broadcast, Point-to-Point, Non-Broadcast, etc.). A mismatch could lead to adjacency issues.
β 2. Verify Subnet Masks
Neighbors must share the same subnet. Run show ip ospf interface to confirm.
β 3. Confirm Hello and Dead Timers
Default timers should match. Use show ip ospf neighbor to check compatibility.
β 4. Authentication Configurations
Is OSPF authentication enabled? Double-check the keys and methods (Plaintext/MD5).
β 5. MTU Mismatch
A mismatch in MTU can cause neighbors to get stuck in ExStart. Use ip ospf mtu-ignore if necessary.
β 6. Router IDs
Each router must have a unique Router ID. Conflicts can disrupt adjacencies.
β 7. Passive Interfaces
Is OSPF accidentally configured as passive on the neighbor-facing interface? Check your configs!
β 8. Access-Lists or Firewalls
Ensure UDP packets on ports 520 and 89 aren't blocked by ACLs or firewalls.
Troubleshooting OSPF is all about systematic checks and leveraging show/debug commands. Here's my golden rule: Start from Layer 1 and move up!
π‘ Whatβs your go-to step when troubleshooting OSPF adjacencies?
Ref: Sumit Kashyap
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Exploiting Crew (Pr1vAt3)
π¦ "Bug Bounty Preparation: Essential HTTP and Networking Resources"
1οΈβ£HTTP Basics
π§¨All in One Resource:
https://www.hacker101.com/sessions/web_in_depth
(Includes: HTTP Basics, Cookie Security, HTML Parsing, MIME Sniffing, Encoding Sniffing, Same-Origin Policy)
HTTP Request Form:
https://www.tutorialspoint.com/http/http_requests.htm
HTTP Response Form:
https://www.tutorialspoint.com/http/http_responses.htm
HTTP Response Codes:
https://www.tutorialspoint.com/http/http_status_codes.htm
HTTP URL Encoding:
https://www.tutorialspoint.com/http/http_url_encoding.htm
π§¨HTTP Basics - Video Resources
HTTP Crash Course & Exploration:
https://www.youtube.com/watch?v=iYM2zFP3Zn0
Same-Origin Policy:
https://www.youtube.com/watch?v=bSJm8-zJTzQ
2οΈβ£Networking Basics
Terminology:
https://www.digitalocean.com/community/tutorials/an-introduction-to-networking-terminology-interfaces-and-protocols
What is an IP?:
https://commotionwireless.net/docs/cck/networking/learn-networking-basics/
What are Ports?:
https://www.utilizewindows.com/list-of-common-network-port-numbers/
What is DNS?:
https://code.tutsplus.com/tutorials/an-introduction-to-learning-and-using-dns-records--cms-24704
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
1οΈβ£HTTP Basics
π§¨All in One Resource:
https://www.hacker101.com/sessions/web_in_depth
(Includes: HTTP Basics, Cookie Security, HTML Parsing, MIME Sniffing, Encoding Sniffing, Same-Origin Policy)
HTTP Request Form:
https://www.tutorialspoint.com/http/http_requests.htm
HTTP Response Form:
https://www.tutorialspoint.com/http/http_responses.htm
HTTP Response Codes:
https://www.tutorialspoint.com/http/http_status_codes.htm
HTTP URL Encoding:
https://www.tutorialspoint.com/http/http_url_encoding.htm
π§¨HTTP Basics - Video Resources
HTTP Crash Course & Exploration:
https://www.youtube.com/watch?v=iYM2zFP3Zn0
Same-Origin Policy:
https://www.youtube.com/watch?v=bSJm8-zJTzQ
2οΈβ£Networking Basics
Terminology:
https://www.digitalocean.com/community/tutorials/an-introduction-to-networking-terminology-interfaces-and-protocols
What is an IP?:
https://commotionwireless.net/docs/cck/networking/learn-networking-basics/
What are Ports?:
https://www.utilizewindows.com/list-of-common-network-port-numbers/
What is DNS?:
https://code.tutsplus.com/tutorials/an-introduction-to-learning-and-using-dns-records--cms-24704
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Hacker101
The Web In Depth
Hacker101 is a free class for web security. Whether youβre a programmer with an interest in bug bounties or a seasoned security professional, Hacker101 has something to teach you.
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π Skopje Government Website Targeted by Funksec #Ransomware Group
https://undercodenews.com/skopje-government-website-targeted-by-funksec-ransomware-group/
@Undercode_News
https://undercodenews.com/skopje-government-website-targeted-by-funksec-ransomware-group/
@Undercode_News
UNDERCODE NEWS
Skopje Government Website Targeted by Funksec Ransomware Group - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π‘οΈ Hackers Steal Over 390,000 Credentials in Deceptive WordPress Attack Targeting Security Researchers
https://undercodenews.com/hackers-steal-over-390000-credentials-in-deceptive-wordpress-attack-targeting-security-researchers/
@Undercode_News
https://undercodenews.com/hackers-steal-over-390000-credentials-in-deceptive-wordpress-attack-targeting-security-researchers/
@Undercode_News
UNDERCODE NEWS
Hackers Steal Over 390,000 Credentials in Deceptive WordPress Attack Targeting Security Researchers - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π Power Up Faster: #Tesla Cybertruck Gets Early Access to Increased Charging Speeds
https://undercodenews.com/power-up-faster-tesla-cybertruck-gets-early-access-to-increased-charging-speeds/
@Undercode_News
https://undercodenews.com/power-up-faster-tesla-cybertruck-gets-early-access-to-increased-charging-speeds/
@Undercode_News
UNDERCODE NEWS
Power Up Faster: Tesla Cybertruck Gets Early Access to Increased Charging Speeds - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE TESTING
π¦Free Huge collections of wordlists for many different usages:
https://github.com/kkrypt0nn/wordlists
https://github.com/kkrypt0nn/wordlists
Forwarded from Exploiting Crew (Pr1vAt3)
π¦Top XDR tools List:
CrowdStrike Falcon Insight - www.crowdstrike.com
Palo Alto Cortex XDR - www.paloaltonetworks.com
Microsoft Defender XDR - www.microsoft.com
Trend Micro Vision One - www.trendmicro.com
IBM Security QRadar XDR - www.ibm.com
VMware Carbon Black Cloud - www.vmware.com
Cisco SecureX - www.cisco.com
Sophos XDR - www.sophos.com
ESET Protect Elite - www.eset.com
LogRhythm SIEM - www.logrhythm.com
ExtraHop Reveal(x) - www.extrahop.com
Bitdefender GravityZone XDR - www.bitdefender.com
NetWitness Platform XDR - www.netwitness.com
Cybereason Defense Platform - www.cybereason.com
ContraForce - www.contraforce.com
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
CrowdStrike Falcon Insight - www.crowdstrike.com
Palo Alto Cortex XDR - www.paloaltonetworks.com
Microsoft Defender XDR - www.microsoft.com
Trend Micro Vision One - www.trendmicro.com
IBM Security QRadar XDR - www.ibm.com
VMware Carbon Black Cloud - www.vmware.com
Cisco SecureX - www.cisco.com
Sophos XDR - www.sophos.com
ESET Protect Elite - www.eset.com
LogRhythm SIEM - www.logrhythm.com
ExtraHop Reveal(x) - www.extrahop.com
Bitdefender GravityZone XDR - www.bitdefender.com
NetWitness Platform XDR - www.netwitness.com
Cybereason Defense Platform - www.cybereason.com
ContraForce - www.contraforce.com
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
π¦Totally free courses.
Now, what's your excuse?
Here are 4 ways you can start today:
1-Cloud Essentials Learning Plan
https://lnkd.in/dGW6tg3S
2-Developer Learning Plan
https://lnkd.in/d44u8BpV
3-Networking Core Learning Plan
https://lnkd.in/dAzxDWft
4-Data Analytics Learning Plan
https://lnkd.in/dCgqbrsD
Ref: Felipe Carvalho
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Now, what's your excuse?
Here are 4 ways you can start today:
1-Cloud Essentials Learning Plan
https://lnkd.in/dGW6tg3S
2-Developer Learning Plan
https://lnkd.in/d44u8BpV
3-Networking Core Learning Plan
https://lnkd.in/dAzxDWft
4-Data Analytics Learning Plan
https://lnkd.in/dCgqbrsD
Ref: Felipe Carvalho
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
π¦The cyber skills gap isn't about talent.
It's about access. π
The cybersecurity learning curve can feel steep.
But here's something many people don't know:
You can get world-class training without spending a dime.
1. Start with the Basics:
- Google's Cybersecurity Professional Certificate walks you through:
* cyber foundations
* risk management
* essential coding skills.
You'll master Linux, SQL, and Python basics in under 6 months.
- The ISC2 Certified in Cybersecurity program is a gem.
The training and certification exam are free - you only pay a $50 annual fee after passing.
2. Level Up with Technical Skills (hands-on practice):
- Security Blue Team offers 6 beginner-friendly courses with real demonstrations.
It's like having a mentor guide you through your first steps.
- TryHackMe and Hack The Box offer hands-on practice in real environments.
You'll learn by doing, not just watching.
3. Build Specialized Knowledge
- The Python Institute is there will elevate your scripting skills.
- The CompTIA Security+ prep materials cover core principles you'll need for entry-level positions.
- SANS teaches you practical basic security concepts.
4. Master Advanced Topics:
- Dive into defensive security and cyber risk management.
- Learn the NIST CSF framework and practical strategies.
- Learn OSINT for smart ways to gather and use public data for defense.
Ref: Liviu Munteanu
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
It's about access. π
The cybersecurity learning curve can feel steep.
But here's something many people don't know:
You can get world-class training without spending a dime.
1. Start with the Basics:
- Google's Cybersecurity Professional Certificate walks you through:
* cyber foundations
* risk management
* essential coding skills.
You'll master Linux, SQL, and Python basics in under 6 months.
- The ISC2 Certified in Cybersecurity program is a gem.
The training and certification exam are free - you only pay a $50 annual fee after passing.
2. Level Up with Technical Skills (hands-on practice):
- Security Blue Team offers 6 beginner-friendly courses with real demonstrations.
It's like having a mentor guide you through your first steps.
- TryHackMe and Hack The Box offer hands-on practice in real environments.
You'll learn by doing, not just watching.
3. Build Specialized Knowledge
- The Python Institute is there will elevate your scripting skills.
- The CompTIA Security+ prep materials cover core principles you'll need for entry-level positions.
- SANS teaches you practical basic security concepts.
4. Master Advanced Topics:
- Dive into defensive security and cyber risk management.
- Learn the NIST CSF framework and practical strategies.
- Learn OSINT for smart ways to gather and use public data for defense.
Ref: Liviu Munteanu
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π§ Call Crisis Averted: NCC Mediates Resolution Between MTN and Globacom
https://undercodenews.com/call-crisis-averted-ncc-mediates-resolution-between-mtn-and-globacom/
@Undercode_News
https://undercodenews.com/call-crisis-averted-ncc-mediates-resolution-between-mtn-and-globacom/
@Undercode_News
UNDERCODE NEWS
Call Crisis Averted: NCC Mediates Resolution Between MTN and Globacom - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π» Never Miss a Beat: Download #YouTube Videos for Offline Viewing on PC, Mac, or #Laptop
https://undercodenews.com/never-miss-a-beat-download-youtube-videos-for-offline-viewing-on-pc-mac-or-laptop/
@Undercode_News
https://undercodenews.com/never-miss-a-beat-download-youtube-videos-for-offline-viewing-on-pc-mac-or-laptop/
@Undercode_News
UNDERCODE NEWS
Never Miss a Beat: Download YouTube Videos for Offline Viewing on PC, Mac, or Laptop - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Tax Authority Tightens Grip on Tech Stock Options
https://undercodenews.com/tax-authority-tightens-grip-on-tech-stock-options/
@Undercode_News
https://undercodenews.com/tax-authority-tightens-grip-on-tech-stock-options/
@Undercode_News
Forwarded from Exploiting Crew (Pr1vAt3)
π¦π
πππ πππππππππ - πππ ππππ
Pentesting is primarily concerned with identifying and exploiting vulnerabilities within a specific target system, striving to uncover as many weaknesses as possible.
This process aids in shoring up an organization's defenses by pinpointing areas of vulnerability.
On the other hand, a red team engagement shifts its focus. Instead of merely finding vulnerabilities, it aims to assess an organization's defensive capabilities by simulating real-world attacks.
The goal is to evaluate how well the organization can detect and respond to these simulated threat actors.
You will find below a list of resources for Red Teaming.
ππͺπππ§ ππ¦ π₯ππ π§πππ ?
πRed Team definition, redteam guide by Joe Vest & James Tubberville
https://lnkd.in/eUaZcWvg
πRed Teaming Handbook, UK Ministry of Defense
https://lnkd.in/euUkwQRq
ππͺπππ§ ππ₯π π₯ππ π§πππ ππ«ππ₯πππ¦ππ¦?
πNISTβs Definition of Red Team Exercise
https://lnkd.in/eZVzn5AW
πRed Team Plan by Magoo
https://lnkd.in/eFUBzxEY
ππ§ππππ‘ππ€π¨ππ¦ ππ‘π π ππ§ππ’ππ’ππ’ππππ¦
πMITRE ATT&CK Matrix for Enterprise
https://attack.mitre.org/
πRed Team Guides by Joe Vest & James Tubberville
https://lnkd.in/eXPxchUk
πRed Team Operations Part 1 and 2 Joas A Santos
https://lnkd.in/e7m3XzE7
https://lnkd.in/es7uSQA4
πRed Team Notes 2.0 by dmcxblue
https://lnkd.in/ekGaQASx
πππ’π¨π₯π¦ππ¦ ππ‘π πππ‘ππ¦ π’π‘
πHackersploit Red Team Series (video and guide)
https://lnkd.in/ek5naA4Q
https://lnkd.in/e4U2tW2z
πResponsible Red Teaming by The Taggart Institute
https://lnkd.in/eur4_nFn
πRed Teaming rooms on TryHackMe
https://lnkd.in/e8G9eMS5
https://lnkd.in/eYa9mHmk
https://lnkd.in/eQcnuu-m
πBoard games by Hadess | ΨΨ§Ψ―Ψ«
https://lnkd.in/ee2EEyEh
ππ§π’π’ππ¦
πRed Teaming Toolkit by infosecn1nja
https://lnkd.in/e8VnsYVH
πRed Team tools by A-poc
https://lnkd.in/evPBDZRm
πRed Teaming Toolkit Collection by 0xsp
https://lnkd.in/eP7jNUE4
πRed Team Ops Cobalt
https://lnkd.in/euMjeFEx
πππ’π‘π¨π¦
πRed Team Resources by J0hnBx
https://lnkd.in/eeYCQ-Db
πRed Team Village talks
https://lnkd.in/eHwKj5gB
πA Beginner's Guide to Obfuscation by BC Security
https://lnkd.in/e92JuwPR
Full credit: Gabrielle B.
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Pentesting is primarily concerned with identifying and exploiting vulnerabilities within a specific target system, striving to uncover as many weaknesses as possible.
This process aids in shoring up an organization's defenses by pinpointing areas of vulnerability.
On the other hand, a red team engagement shifts its focus. Instead of merely finding vulnerabilities, it aims to assess an organization's defensive capabilities by simulating real-world attacks.
The goal is to evaluate how well the organization can detect and respond to these simulated threat actors.
You will find below a list of resources for Red Teaming.
ππͺπππ§ ππ¦ π₯ππ π§πππ ?
πRed Team definition, redteam guide by Joe Vest & James Tubberville
https://lnkd.in/eUaZcWvg
πRed Teaming Handbook, UK Ministry of Defense
https://lnkd.in/euUkwQRq
ππͺπππ§ ππ₯π π₯ππ π§πππ ππ«ππ₯πππ¦ππ¦?
πNISTβs Definition of Red Team Exercise
https://lnkd.in/eZVzn5AW
πRed Team Plan by Magoo
https://lnkd.in/eFUBzxEY
ππ§ππππ‘ππ€π¨ππ¦ ππ‘π π ππ§ππ’ππ’ππ’ππππ¦
πMITRE ATT&CK Matrix for Enterprise
https://attack.mitre.org/
πRed Team Guides by Joe Vest & James Tubberville
https://lnkd.in/eXPxchUk
πRed Team Operations Part 1 and 2 Joas A Santos
https://lnkd.in/e7m3XzE7
https://lnkd.in/es7uSQA4
πRed Team Notes 2.0 by dmcxblue
https://lnkd.in/ekGaQASx
πππ’π¨π₯π¦ππ¦ ππ‘π πππ‘ππ¦ π’π‘
πHackersploit Red Team Series (video and guide)
https://lnkd.in/ek5naA4Q
https://lnkd.in/e4U2tW2z
πResponsible Red Teaming by The Taggart Institute
https://lnkd.in/eur4_nFn
πRed Teaming rooms on TryHackMe
https://lnkd.in/e8G9eMS5
https://lnkd.in/eYa9mHmk
https://lnkd.in/eQcnuu-m
πBoard games by Hadess | ΨΨ§Ψ―Ψ«
https://lnkd.in/ee2EEyEh
ππ§π’π’ππ¦
πRed Teaming Toolkit by infosecn1nja
https://lnkd.in/e8VnsYVH
πRed Team tools by A-poc
https://lnkd.in/evPBDZRm
πRed Teaming Toolkit Collection by 0xsp
https://lnkd.in/eP7jNUE4
πRed Team Ops Cobalt
https://lnkd.in/euMjeFEx
πππ’π‘π¨π¦
πRed Team Resources by J0hnBx
https://lnkd.in/eeYCQ-Db
πRed Team Village talks
https://lnkd.in/eHwKj5gB
πA Beginner's Guide to Obfuscation by BC Security
https://lnkd.in/e92JuwPR
Full credit: Gabrielle B.
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
lnkd.in
LinkedIn
This link will take you to a page thatβs not on LinkedIn
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π± A Royal Encounter with #AI: King Charles III Amazed by #Apple's Image Wand
https://undercodenews.com/a-royal-encounter-with-ai-king-charles-iii-amazed-by-apples-image-wand/
@Undercode_News
https://undercodenews.com/a-royal-encounter-with-ai-king-charles-iii-amazed-by-apples-image-wand/
@Undercode_News
UNDERCODE NEWS
A Royal Encounter with AI: King Charles III Amazed by Apple's Image Wand - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π± #Apple's #AI-Powered Notifications Under Fire for False Reports
https://undercodenews.com/apples-ai-powered-notifications-under-fire-for-false-reports/
@Undercode_News
https://undercodenews.com/apples-ai-powered-notifications-under-fire-for-false-reports/
@Undercode_News
UNDERCODE NEWS
Apple's AI-Powered Notifications Under Fire for False Reports - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π The Myth of #AI Emotion Recognition: Science or Sales Pitch?
https://undercodenews.com/the-myth-of-ai-emotion-recognition-science-or-sales-pitch/
@Undercode_News
https://undercodenews.com/the-myth-of-ai-emotion-recognition-science-or-sales-pitch/
@Undercode_News
UNDERCODE NEWS
The Myth of AI Emotion Recognition: Science or Sales Pitch? - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Sharp & Carter CEO Sparks Controversy with Blunt Christmas Speech
https://undercodenews.com/sharp-carter-ceo-sparks-controversy-with-blunt-christmas-speech/
@Undercode_News
https://undercodenews.com/sharp-carter-ceo-sparks-controversy-with-blunt-christmas-speech/
@Undercode_News
UNDERCODE NEWS
Sharp & Carter CEO Sparks Controversy with Blunt Christmas Speech - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦