Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ฑ #Apple's AR Glasses: A Glimpse into the Future, Delayed
https://undercodenews.com/apples-ar-glasses-a-glimpse-into-the-future-delayed/
@Undercode_News
https://undercodenews.com/apples-ar-glasses-a-glimpse-into-the-future-delayed/
@Undercode_News
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
#Samsung #Galaxy S25 Ultra: The Thinnest Bezel King?
https://undercodenews.com/samsung-galaxy-s25-ultra-the-thinnest-bezel-king/
@Undercode_News
https://undercodenews.com/samsung-galaxy-s25-ultra-the-thinnest-bezel-king/
@Undercode_News
UNDERCODE NEWS
Samsung Galaxy S25 Ultra: The Thinnest Bezel King? - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ FunkSec #Ransomware Targets Pakistani Government Website
https://undercodenews.com/funksec-ransomware-targets-pakistani-government-website/
@Undercode_News
https://undercodenews.com/funksec-ransomware-targets-pakistani-government-website/
@Undercode_News
UNDERCODE NEWS
FunkSec Ransomware Targets Pakistani Government Website - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ FunkSec #Ransomware Targets Mongolian Government Website
https://undercodenews.com/funksec-ransomware-targets-mongolian-government-website/
@Undercode_News
https://undercodenews.com/funksec-ransomware-targets-mongolian-government-website/
@Undercode_News
UNDERCODE NEWS
FunkSec Ransomware Targets Mongolian Government Website - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Russia's Sinister Game: Recruiting Ukrainian Teens for #Espionage
https://undercodenews.com/russias-sinister-game-recruiting-ukrainian-teens-for-espionage/
@Undercode_News
https://undercodenews.com/russias-sinister-game-recruiting-ukrainian-teens-for-espionage/
@Undercode_News
UNDERCODE NEWS
Russia's Sinister Game: Recruiting Ukrainian Teens for Espionage - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ๐๐๐ ๐๐ก๐ซ๐จ๐ฎ๐ ๐ก ๐๐๐๐
๐๐๐๐ฌ ๐
I often see applications that let their users control URLs which are reflected back in the DOM as part of the HREF tag
Most of the time these features let you:
โข set the integration URL with a 3rd party service
โข customize your profile page with a link to your own blog/website
โข link your account to you social media profile
While sometimes developers use HTML encoding on quotes to block attackers from escaping the tag, there are several ways to trigger XSS inside href tags <without> escaping them.
One of them is to provide a valid URL format (to bypass server-side validation) but use the javascript protocol (instead of http which is what most developers would expect)
Note however that this won't work if the target="_blank" is specified
Ref: Andrei Agape
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
I often see applications that let their users control URLs which are reflected back in the DOM as part of the HREF tag
Most of the time these features let you:
โข set the integration URL with a 3rd party service
โข customize your profile page with a link to your own blog/website
โข link your account to you social media profile
While sometimes developers use HTML encoding on quotes to block attackers from escaping the tag, there are several ways to trigger XSS inside href tags <without> escaping them.
One of them is to provide a valid URL format (to bypass server-side validation) but use the javascript protocol (instead of http which is what most developers would expect)
Note however that this won't work if the target="_blank" is specified
Ref: Andrei Agape
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โก๏ธ #Apple in the Enterprise: A New Perspective
https://undercodenews.com/apple-in-the-enterprise-a-new-perspective/
@Undercode_News
https://undercodenews.com/apple-in-the-enterprise-a-new-perspective/
@Undercode_News
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ Interlock #Ransomware Targets Heritage Bank
https://undercodenews.com/interlock-ransomware-targets-heritage-bank/
@Undercode_News
https://undercodenews.com/interlock-ransomware-targets-heritage-bank/
@Undercode_News
UNDERCODE NEWS
Interlock Ransomware Targets Heritage Bank - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐จ Unmasking Threats Before They Strike: 5 Powerful Techniques for Better Security
https://undercodenews.com/unmasking-threats-before-they-strike-5-powerful-techniques-for-better-security/
@Undercode_News
https://undercodenews.com/unmasking-threats-before-they-strike-5-powerful-techniques-for-better-security/
@Undercode_News
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ FBI Dismantles Rydox: A Major Blow to the Dark Web
https://undercodenews.com/fbi-dismantles-rydox-a-major-blow-to-the-dark-web/
@Undercode_News
https://undercodenews.com/fbi-dismantles-rydox-a-major-blow-to-the-dark-web/
@Undercode_News
UNDERCODE NEWS
FBI Dismantles Rydox: A Major Blow to the Dark Web - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ
๐ญ. ๐๐ผ๐ฐ๐๐ ๐ผ๐ป ๐๐ฒ๐ฝ๐๐ต ๐ผ๐๐ฒ๐ฟ ๐๐ฟ๐ฒ๐ฎ๐ฑ๐๐ต:
- Don't solve 500 coding problems aimlessly. Master around 100 core problems deeply instead.
- 40 Problems on Array, Strings, LinkedList, Stack & Queue, Binary search, Trees, Graph, Sorting and Searching: https://lnkd.in/djnaPkeD
- 40 Problems on Dynamic Programming (DP), Backtracking, Hashing, Heap, Tries, and Greedy Algorithms: https://lnkd.in/dF3h-Khk
๐ฎ. ๐๐ฟ๐ฒ๐ฎ๐๐ฒ ๐ฎ ๐น๐ถ๐๐ ๐ผ๐ณ ๐ธ๐ฒ๐ ๐พ๐๐ฒ๐๐๐ถ๐ผ๐ป๐:
- Use resources like "Strivers A2Z DSA Sheet" by Raj Vikramaditya to curate around 100 core problems.
- https://lnkd.in/dQMGy9zF (Strivers)
๐ฏ. ๐ ๐ฎ๐๐๐ฒ๐ฟ ๐ฒ๐ฎ๐ฐ๐ต ๐ฑ๐ฎ๐๐ฎ ๐๐๐ฟ๐๐ฐ๐๐๐ฟ๐ฒ:
- Understand and implement them by hand. Know how they work internally to ace interview questions.
- Fundamentals, Intermediate, Advance DSA topics: https://lnkd.in/d4ws9xfr
๐ฐ. ๐ฃ๐ฟ๐ฎ๐ฐ๐๐ถ๐ฐ๐ฒ ๐๐ถ๐๐ต ๐ฆ๐ฝ๐ฎ๐ฐ๐ฒ๐ฑ ๐ฅ๐ฒ๐ฝ๐ฒ๐๐ถ๐๐ถ๐ผ๐ป:
- Revisit problems after 3 days, a week, and 15 days. Break down solutions instead of rote memorization.
- 3:7:15 Rule for DSA: https://lnkd.in/dW6a8wcg
๐ฑ. ๐๐ฑ๐ฒ๐ป๐๐ถ๐ณ๐ ๐ฟ๐ฒ๐๐๐ฎ๐ฏ๐น๐ฒ ๐๐ฒ๐ฐ๐ต๐ป๐ถ๐พ๐๐ฒ๐ ๐ฎ๐ป๐ฑ ๐ฐ๐ผ๐ฑ๐ฒ ๐ฏ๐น๐ผ๐ฐ๐ธ๐:
- Isolate common patterns like Binary Search or Depth First Search for focused practice.
- 20 DSA patterns: https://lnkd.in/d9GCezMm
- 14 problem solving patterns: https://lnkd.in/daysVFSz
- DSA questions patterns: https://lnkd.in/d3rRHTfE
๐ฒ. ๐๐ ๐ฝ๐ฎ๐ป๐ฑ ๐ถ๐ป๐๐ผ ๐๐ฟ๐ฒ๐ฎ๐ฑ๐๐ต:
- Once you've mastered core problems and techniques, tackle a wider range of questions. Keep it realistic and relevant to interview scenarios.
- 16 Important algorithms problems: https://lnkd.in/dfjm8ked
- Tips to solve any DSA question by understanding patterns: https://lnkd.in/d9GVyfBY
Additional tips
Practice on paper: Practice whiteboard interviews to improve your planning and coding skills without relying on an IDE. Itโs a practical way to get ready for real interviews.
Ref: Rajat Gajbhiye
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
DSA is so easy when you follow these 6 steps:
๐ญ. ๐๐ผ๐ฐ๐๐ ๐ผ๐ป ๐๐ฒ๐ฝ๐๐ต ๐ผ๐๐ฒ๐ฟ ๐๐ฟ๐ฒ๐ฎ๐ฑ๐๐ต:
- Don't solve 500 coding problems aimlessly. Master around 100 core problems deeply instead.
- 40 Problems on Array, Strings, LinkedList, Stack & Queue, Binary search, Trees, Graph, Sorting and Searching: https://lnkd.in/djnaPkeD
- 40 Problems on Dynamic Programming (DP), Backtracking, Hashing, Heap, Tries, and Greedy Algorithms: https://lnkd.in/dF3h-Khk
๐ฎ. ๐๐ฟ๐ฒ๐ฎ๐๐ฒ ๐ฎ ๐น๐ถ๐๐ ๐ผ๐ณ ๐ธ๐ฒ๐ ๐พ๐๐ฒ๐๐๐ถ๐ผ๐ป๐:
- Use resources like "Strivers A2Z DSA Sheet" by Raj Vikramaditya to curate around 100 core problems.
- https://lnkd.in/dQMGy9zF (Strivers)
๐ฏ. ๐ ๐ฎ๐๐๐ฒ๐ฟ ๐ฒ๐ฎ๐ฐ๐ต ๐ฑ๐ฎ๐๐ฎ ๐๐๐ฟ๐๐ฐ๐๐๐ฟ๐ฒ:
- Understand and implement them by hand. Know how they work internally to ace interview questions.
- Fundamentals, Intermediate, Advance DSA topics: https://lnkd.in/d4ws9xfr
๐ฐ. ๐ฃ๐ฟ๐ฎ๐ฐ๐๐ถ๐ฐ๐ฒ ๐๐ถ๐๐ต ๐ฆ๐ฝ๐ฎ๐ฐ๐ฒ๐ฑ ๐ฅ๐ฒ๐ฝ๐ฒ๐๐ถ๐๐ถ๐ผ๐ป:
- Revisit problems after 3 days, a week, and 15 days. Break down solutions instead of rote memorization.
- 3:7:15 Rule for DSA: https://lnkd.in/dW6a8wcg
๐ฑ. ๐๐ฑ๐ฒ๐ป๐๐ถ๐ณ๐ ๐ฟ๐ฒ๐๐๐ฎ๐ฏ๐น๐ฒ ๐๐ฒ๐ฐ๐ต๐ป๐ถ๐พ๐๐ฒ๐ ๐ฎ๐ป๐ฑ ๐ฐ๐ผ๐ฑ๐ฒ ๐ฏ๐น๐ผ๐ฐ๐ธ๐:
- Isolate common patterns like Binary Search or Depth First Search for focused practice.
- 20 DSA patterns: https://lnkd.in/d9GCezMm
- 14 problem solving patterns: https://lnkd.in/daysVFSz
- DSA questions patterns: https://lnkd.in/d3rRHTfE
๐ฒ. ๐๐ ๐ฝ๐ฎ๐ป๐ฑ ๐ถ๐ป๐๐ผ ๐๐ฟ๐ฒ๐ฎ๐ฑ๐๐ต:
- Once you've mastered core problems and techniques, tackle a wider range of questions. Keep it realistic and relevant to interview scenarios.
- 16 Important algorithms problems: https://lnkd.in/dfjm8ked
- Tips to solve any DSA question by understanding patterns: https://lnkd.in/d9GVyfBY
Additional tips
Practice on paper: Practice whiteboard interviews to improve your planning and coding skills without relying on an IDE. Itโs a practical way to get ready for real interviews.
Ref: Rajat Gajbhiye
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Linkedin
How to ace your interview with DSA questions | Rajat Gajbhiye posted on the topic | LinkedIn
DSA on SUNDAY!
We're back againโก
Here are 40 most asked DSA questions to ace your next interview -
๐๐ฟ๐ฟ๐ฎ๐๐ ๐ฎ๐ป๐ฑ ๐ฆ๐๐ฟ๐ถ๐ป๐ด๐:
1. Find the maximum sum subarray.
2. Find all substrings that are palindromes.
3. Implement the "two sum" problem.
4. Implement Kadane'sโฆ
We're back againโก
Here are 40 most asked DSA questions to ace your next interview -
๐๐ฟ๐ฟ๐ฎ๐๐ ๐ฎ๐ป๐ฑ ๐ฆ๐๐ฟ๐ถ๐ป๐ด๐:
1. Find the maximum sum subarray.
2. Find all substrings that are palindromes.
3. Implement the "two sum" problem.
4. Implement Kadane'sโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ A Greener Search: #Firefox Partners with Ecosia
https://undercodenews.com/a-greener-search-firefox-partners-with-ecosia/
@Undercode_News
https://undercodenews.com/a-greener-search-firefox-partners-with-ecosia/
@Undercode_News
UNDERCODE NEWS
A Greener Search: Firefox Partners with Ecosia - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
#Nvidia's RTX 5060: A Controversial 8GB VRAM Rumor
https://undercodenews.com/nvidias-rtx-5060-a-controversial-8gb-vram-rumor/
@Undercode_News
https://undercodenews.com/nvidias-rtx-5060-a-controversial-8gb-vram-rumor/
@Undercode_News
UNDERCODE NEWS
Nvidia's RTX 5060: A Controversial 8GB VRAM Rumor - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ๐ Mastering DNS & DHCP Penetration Testing: Protect Your Networkโs Core!
DNS (Domain Name System) and DHCP (Dynamic Host Configuration Protocol) are foundational to network operations. However, their vulnerabilities can make them prime targets for cyberattacks. Understanding how to test and secure these protocols is a critical skill for any cybersecurity professional.
Common DNS Vulnerabilities & Attacks:
1๏ธโฃ DNS Spoofing/Poisoning: Alters DNS responses to redirect users to malicious websites.
2๏ธโฃ DNS Tunneling: Exfiltrates data or establishes backdoors via DNS queries.
3๏ธโฃ Cache Poisoning: Manipulates DNS cache entries to disrupt or redirect traffic.
4๏ธโฃ Zone Transfer Exploitation: Misuses misconfigured servers to access sensitive DNS records.
Common DHCP Vulnerabilities & Attacks:
1๏ธโฃ DHCP Starvation Attack: Exhausts IP leases, causing network disruptions.
2๏ธโฃ Rogue DHCP Server Attack: Deploys unauthorized DHCP servers to provide malicious configurations.
3๏ธโฃ Man-in-the-Middle (MITM) Attacks: Exploits DHCP to intercept sensitive data.
4๏ธโฃ IP Address Spoofing: Mimics authorized devices to gain network access.
Steps to Perform DNS & DHCP Penetration Testing:
1๏ธโฃ Reconnaissance:
โข Use tools like Dig, DNSRecon, and Fierce to identify DNS configurations.
โข Scan for active DHCP servers using DHCPig or Yersinia.
2๏ธโฃ Vulnerability Analysis:
โข Check for weak configurations in DNS records (e.g., open zone transfers).
โข Identify rogue DHCP servers or insufficient IP allocations.
3๏ธโฃ Exploitation:
โข Simulate DNS Spoofing or Cache Poisoning to test resilience.
โข Perform DHCP Starvation or Rogue Server attacks in a controlled environment.
4๏ธโฃ Remediation:
โข Harden DNS configurations (disable unused services, restrict zone transfers).
โข Enable DHCP snooping and IP source guard to prevent rogue DHCP servers.
Pro Tip for Defenders:
โข Implement DNSSEC (Domain Name System Security Extensions) to validate DNS responses.
โข Regularly monitor and test DHCP and DNS servers for vulnerabilities.
๐ Remember: Always test ethically with proper authorization!
๐ DNS and DHCP are the backbone of every network. Securing them not only prevents breaches but ensures smooth operations for businesses.
DNS (Domain Name System) and DHCP (Dynamic Host Configuration Protocol) are foundational to network operations. However, their vulnerabilities can make them prime targets for cyberattacks. Understanding how to test and secure these protocols is a critical skill for any cybersecurity professional.
Common DNS Vulnerabilities & Attacks:
1๏ธโฃ DNS Spoofing/Poisoning: Alters DNS responses to redirect users to malicious websites.
2๏ธโฃ DNS Tunneling: Exfiltrates data or establishes backdoors via DNS queries.
3๏ธโฃ Cache Poisoning: Manipulates DNS cache entries to disrupt or redirect traffic.
4๏ธโฃ Zone Transfer Exploitation: Misuses misconfigured servers to access sensitive DNS records.
Common DHCP Vulnerabilities & Attacks:
1๏ธโฃ DHCP Starvation Attack: Exhausts IP leases, causing network disruptions.
2๏ธโฃ Rogue DHCP Server Attack: Deploys unauthorized DHCP servers to provide malicious configurations.
3๏ธโฃ Man-in-the-Middle (MITM) Attacks: Exploits DHCP to intercept sensitive data.
4๏ธโฃ IP Address Spoofing: Mimics authorized devices to gain network access.
Steps to Perform DNS & DHCP Penetration Testing:
1๏ธโฃ Reconnaissance:
โข Use tools like Dig, DNSRecon, and Fierce to identify DNS configurations.
โข Scan for active DHCP servers using DHCPig or Yersinia.
2๏ธโฃ Vulnerability Analysis:
โข Check for weak configurations in DNS records (e.g., open zone transfers).
โข Identify rogue DHCP servers or insufficient IP allocations.
3๏ธโฃ Exploitation:
โข Simulate DNS Spoofing or Cache Poisoning to test resilience.
โข Perform DHCP Starvation or Rogue Server attacks in a controlled environment.
4๏ธโฃ Remediation:
โข Harden DNS configurations (disable unused services, restrict zone transfers).
โข Enable DHCP snooping and IP source guard to prevent rogue DHCP servers.
Pro Tip for Defenders:
โข Implement DNSSEC (Domain Name System Security Extensions) to validate DNS responses.
โข Regularly monitor and test DHCP and DNS servers for vulnerabilities.
๐ Remember: Always test ethically with proper authorization!
๐ DNS and DHCP are the backbone of every network. Securing them not only prevents breaches but ensures smooth operations for businesses.
Forwarded from Exploiting Crew (Pr1vAt3)
DNS&DHCP_HACK.pdf
2.1 MB
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โก๏ธ #Windows 11 Gets a Much-Needed Webcam Upgrade
https://undercodenews.com/windows-11-gets-a-much-needed-webcam-upgrade/
@Undercode_News
https://undercodenews.com/windows-11-gets-a-much-needed-webcam-upgrade/
@Undercode_News
UNDERCODE NEWS
Windows 11 Gets a Much-Needed Webcam Upgrade - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โก๏ธ A Transatlantic Dream: Musk's Vision for a New York-London Tunnel
https://undercodenews.com/a-transatlantic-dream-musks-vision-for-a-new-york-london-tunnel/
@Undercode_News
https://undercodenews.com/a-transatlantic-dream-musks-vision-for-a-new-york-london-tunnel/
@Undercode_News
UNDERCODE NEWS
A Transatlantic Dream: Musk's Vision for a New York-London Tunnel - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM