UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
πŸ“Š Shein's Indian Comeback: Conditional on Data Localization and Reliance Partnership

https://undercodenews.com/sheins-indian-comeback-conditional-on-data-localization-and-reliance-partnership/

@Undercode_News
Forwarded from UNDERCODE TESTING
πŸ¦‘Detection of teams convoC2 Mainly used by Red Teamers recent days.

Basically it causes out bound requests to C2 Server, exfiltrates command outputs from Adaptive Cards images URLs and inserting data into hidden span tags in Microsoft teams conservations.
The fact that the victim only sends http queries to Microsoft servers and the antivirus doesn't examine MS teams log files and in absence of direct connection between the victim and attacker in this case its very difficult to detect.

Here is the custom KQL to Detect.

CloudAppEvents
| where Timestamp > ago(1h)
| where Application contains "Microsoft Teams"
| where ActionType contains "AppInstalled"
| where parse_json(RawEventData)["AddOnName"] == 'Workflows'

Ref: Kintali Sai Dinesh
@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
πŸ¦‘18 Must-Have Free Tools for Cybersecurity Enthusiasts πŸ›‘οΈ

As a cybersecurity professional, staying ahead of the curve requires constant learning and hands-on practice. The good news? You don’t need to break the bank to access industry-leading tools. Here's a curated list of 18 free cybersecurity tools to elevate your skillsβ€”whether you're a beginner or a seasoned expert!

πŸ”΅ 1. Kali Linux
The ultimate penetration testing operating system for ethical hackers.

πŸ”΅ 2. Wireshark
A network protocol analyzer that lets you capture and inspect data in real time.

πŸ”΅ 3. Burp Suite Community Edition
Perfect for web application security testing and vulnerability assessments.

πŸ”΅ 4. Gophish
An open-source phishing toolkit for creating realistic phishing campaigns.

πŸ”΅ 5. Aircrack-ng
Specializes in cracking WEP/WPA Wi-Fi passwords.

πŸ”΅ 6. Have I Been Pwned?
Check if your email or accounts have been compromised in data breaches.

πŸ”΅ 7. Metasploit Framework
A penetration testing powerhouse for exploiting vulnerabilities.

πŸ”΅ 8. Nikto
Scans web servers for dangerous files, outdated software, and misconfigurations.

πŸ”΅ 9. HackTheBox
An interactive training platform to sharpen your hacking skills.

πŸ”΅ 10. pfSense
A firewall and router solution for network protection.

πŸ”΅ 11. CyberChef
A versatile tool for analyzing, encrypting, and decoding data.

πŸ”΅ 12. Ghidra
An open-source reverse engineering tool by the NSA.

πŸ”΅ 13. Deshashed
Enhance email security by detecting exposed credentials.

πŸ”΅ 14. OpenVAS
A comprehensive vulnerability scanner for systems and networks.

πŸ”΅ 15. OSSEC
Monitor and prevent intrusions in your environment with this HIDS tool.

πŸ”΅ 16. SQLmap
Automatically detect and exploit SQL injection vulnerabilities.

πŸ”΅ 17. REMnux
Reverse engineering and malware analysis made accessible.

πŸ”΅ 18. Zed Attack Proxy (ZAP)
A web application security scanner for discovering vulnerabilities.


🌟 Why Use These Tools?
- Cost-Effective: Free but highly efficient.
- Industry Standard: Frequently used by professionals worldwide.
- Skill Development: Master critical areas like penetration testing, vulnerability analysis, and data protection.

Ref: Arun KL
@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE TESTING
πŸ¦‘π—£π—Όπ˜„π—²π—Ώπ—¦π—΅π—²π—Ήπ—Ή 𝗦𝗲𝗹𝗳-π—£π˜„π—» π——π—²π˜π—²π—°π˜π—Άπ—Όπ—»

The Proofpoint blog outlines a social engineering tactic where threat actors deceive users into copying and pasting malicious PowerShell scripts, causing malware infections. Groups like TA571 use fake error messages to prompt script execution, delivering malware such as DarkGate and NetSupport. Despite needing significant user interaction, the attack's success hinges on sophisticated social engineering. I have developed a custom detection PowerShell Self-Pwn KQL to identify such scenarios and assist SecOps in isolating affected devices.

Ref: Steven Lim
@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
🚨 Facebook Parent Company Meta Fined €251 Million for 2018 #Data Breach

https://undercodenews.com/facebook-parent-company-meta-fined-eur251-million-for-2018-data-breach/

@Undercode_News
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
πŸ¦‘Security collection for pro:

βœ…Worm Infection: https://lnkd.in/ez-kq98Y
βœ…Social Engineering: https://lnkd.in/e_FJbxDP
βœ…Information Leakage: https://lnkd.in/eeN8KX8g
βœ…Insider Abuse: https://lnkd.in/ep4p_THk
βœ…Customer Phishing: https://lnkd.in/ekTfY7vz
βœ…Scam: https://lnkd.in/eUHwG3fF
βœ…Trademark infringement: https://lnkd.in/e3P3xfeb
βœ…Phishing: https://lnkd.in/eYTi3RQ8
βœ…Ransomware: https://lnkd.in/eRkctdQn
βœ…Large_scale_compromise: https://lnkd.in/eYFF43b4
βœ…3rd-party_compromise: https://lnkd.in/e8SAu5MT
βœ…Windows Intrusion: https://lnkd.in/eXCpcx9V
βœ…Unix Linux lntrusionDetection: https://lnkd.in/eHkm6MMe
βœ…DDOS: https://lnkd.in/eQ7zZzVt
βœ…MaliciousNetworkBehaviour: https://lnkd.in/ewVZy2cs
βœ…Website-Defacement: https://lnkd.in/eraNiHcH
βœ…WindowsMalwareDetection: https://lnkd.in/ewEx_C6Y
βœ…Blackmail: https://lnkd.in/eW3zGcPs
βœ…SmartphoneMalware.pdf: https://lnkd.in/ezjyY4G9

Ref: Mohamad Hamadi
@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE NEWS (UNDERCODER)
We had a hardware issue recently, and it's fixed. πŸ™‚β€β†”οΈ