UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.7K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ¦‘Extracting information remotely from Microsoft Remote Desktop Web Access (RDWA) with RDWAtool

πŸ” Microsoft Remote Desktop Web Access (RDWA) applications are often overlooked yet can be a treasure trove of information for attackers. RDWAtool is a Python-based all-in-one tool designed to analyze and test RDWA instances for vulnerabilities while extracting valuable insights.
πŸ›  What can RDWAtool do?

1️⃣ Extract useful Information in black box remotely:
- FQDN of the remote server to map the environment.
- Internal AD domain name derived from the FQDN.
- Remote Windows Server version for targeted exploitation.

In spray mode:

rdwatool spray -tu https://rds.podalirius.net/RDWeb/Pages/en-US/login.aspx


In brute mode:

rdwatool brute -tu https://rds.podalirius.net/RDWeb/Pages/en-US/login.aspx

> Free <
@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
πŸ¦‘πŸ’° Cost Savings: SSE vs. SASE Simplified!

🌐 Organizations leveraging Palo Alto Networks experience significant ROI through unified management and simplified operationsβ€”all within a single pane of glass.
Streamline your security strategy while accelerating growth!
What’s the Difference?

🟠 SSE (Security Service Edge):
Focuses on securing access to apps and data for remote and on-premises users.
Core features: SWG, CASB, and ZTNA for seamless, secure connectivity.

🟠 SASE (Secure Access Service Edge):
Combines networking (SD-WAN) and security services in a single cloud-delivered solution.

Perfect for securing distributed users and sites with optimal performance.
Why Choose Palo Alto Networks?

βœ”οΈ Unified platform for better visibility and control.
βœ”οΈ Simplified operations with scalable solutions for all use cases.
βœ”οΈ Future-ready security with proven innovation.

Let’s make security smarter, faster, and simplerβ€”together!

Ref: Dhari A.Dhari A.
@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE TESTING
πŸ¦‘ Honeypot Integration with Elastic Stack - A Practical Guide πŸ›‘

In this project , i have integrated Honeypot (trap for hackers) with the ELK Stack to monitor the real-time alerts and advanced threat hunting. πŸ•΅οΈβ€β™‚οΈ
πŸ”§ Key Steps:

1️⃣ Honeypot Setup: Deployed multiple honeypot services to capture malicious activity. (Requires a public IP 🌐)

2️⃣ ELK Stack Installation: The Elastic Stack plays a pivotal role in collecting, storing, and visualizing the data from the T-Pot honeypot. πŸ“Š

3️⃣ Data Filtration & Visualization: Filtered and visualized attack data in Kibana for actionable insights. πŸ”πŸ“ˆ

Note : This project can be extended to capture the IOC’s like users can add their own threat intelligence databases and can use python scripts to train the machine learning models for future use .πŸ”’For instance , a MISP instance can be setup to store the IOC's from this honeypot.

Ref: HAMZA JAMEEL
@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
πŸ¦‘ ShellSweep: Detecting Web Shells Made Easy for Defenders πŸš€

🐚 What is ShellSweep?
ShellSweep is a suite of open-source tools designed to detect web shells using entropy analysis, static code checks, and heuristic methods. From incident response to threat hunting, ShellSweep helps defenders identify suspicious files quickly and efficiently.

πŸ› Why Defenders Need ShellSweep
βœ… Test Your Coverage: Validate analytic detection for file mods, process executions, and suspicious behavior from web shells.
βœ… Tuning & Training: Scan web servers, analyze entropy baselines, and tune detection to YOUR environment.
βœ… Lightweight & Customizable: Works locally, supports PowerShell, Python, and Lua. Full control with zero dependency on external services.

🐚 ShellSweep: The foundation.
- Detects web shells using entropy-based analysis.
- Scans key extensions (.asp, .aspx, .php, .jsp) for high-entropy anomalies.
- Outputs file paths, entropy values, and hashes.

🐚🐚 ShellSweepPlus: Enhanced detection.
- Dynamic entropy thresholds.
- Multi-layered detection: Entropy, StdDev, Mixed Mode, and Heuristics.
- Static code analysis to spot malicious patterns.
- JSON outputs for structured results & further analysis.

🐚🐚🐚 ShellSweepX: Next-level, centralized detection.
- Combines entropy analysis, machine learning, and YARA rule matching.
- Cross-platform (PowerShell, Python, Bash).
- API integration for automated scans and result management.
- Web interface for visualizing and managing detections.

✨ Perfect for Incident Responders & Threat Hunters
πŸ›‘ Deploy ShellSweep tools in test or production environments.
πŸ” Load up your preferred web shells, simulate uploads, and refine detection rules.
πŸ“ˆ Detect new or obfuscated threats. Identify gaps. Tune your defenses.

🧰 ShellSweep: ShellSweeping the Evil!

Ref: Michael H.Michael H.
@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁