UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.3K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODE TESTING
πŸ¦‘Active Directory Hardening Checklist
Forwarded from UNDERCODE TESTING
πŸ¦‘How to Spot a Pentester
Forwarded from Exploiting Crew (Pr1vAt3)
πŸ¦‘Top Password Reset Functionality Bugs
πŸ›‘οΈ
Testing password reset flows is critical to ensuring account security. Here’s a checklist of common vulnerabilities to watch out for:

No rate limiting

Token leakage

Email manipulation

Self-XSS risks

Brute force reset attempts

Each of these bugs can lead to serious account takeovers (critical vulnerability) if overlooked. What other password reset vulnerabilities have you come across in your tests?

Ref: Amit Kumar
@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE TESTING
πŸ¦‘This one command is enough to knock down your entire wifi.

-S : Send syn packets
--flood : Sent packets as fast as possible

Simple DOS attack, works really well on non-enterprise networks. Implement firewall/filter rules in your router to avoid these attacks.

However in some cases it can increase resources usage on router that could still lead to crashes.

Ref: Steven Lim
@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
πŸ¦‘Top Shodan Dorks for Finding Sensitive IoT Data 🌐

Are you testing IoT devices and systems for vulnerabilities? Shodan, the search engine for internet-connected devices, can reveal critical data with the right queries.

This cheat sheet contains useful Shodan dorks to identify exposed services, misconfigurations, and unsecured devices, such as: βœ… Open ports: 23 (Telnet), 21 (FTP), 3306 (MySQL)
βœ… Exposed services: PostgreSQL, MongoDB, Apache, Jenkins, MikroTik
βœ… Sensitive information: "MongoDB Server Information," "200 OK" responses, and certificate details

Some highlights include:

Finding unprotected remote desktops (port:3389)

Identifying insecure databases (port:27017, MongoDB authentication disabled)

Locating industrial devices and firmware (port:5006,5007 Mitsubishi)


Why does this matter?
IoT devices are often overlooked and can serve as easy targets for attackers if not properly secured. By searching for exposed ports and services, security researchers can help organizations address these risks proactively.

πŸ“’ A friendly reminder: Use this knowledge responsibly. Only test systems you have permission to access!

Ref: AMIT KUMARAMIT KUMAR
@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁