UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.8K links
🦑 Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

Web & Services:
Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
🦑Encryption vs Hashing - What's the difference?

Imagine you have a secret recipe for a cake, and you want to share it with a friend.

🤵Encryption:

You lock the recipe in a box with a key and give the box to your friend.

Your friend can unlock the box (with the key you gave them) and read the recipe.

If someone else finds the box without the key, they can't read it.
Key Point: It can be reversed if you have the key (decrypt it).

🧛Hashing:

You put the recipe in a blender and blend it into a unique smoothie.

Now it’s impossible to get the original recipe back from the smoothie.

But if someone else blends the exact same recipe, they’ll get the exact same smoothie.

Key Point: One-way process. You can’t go back to the recipe, but you can check if two smoothies match.

In short:

Encryption is like locking something up—can be unlocked.

Hashing is like turning it into mush—you can’t un-mush it!

As both methods involve turning data into a scrambled form, one might consider these two the same. However, there is a distinction you must know about:

Data is encrypted twice while it’s only hashed once.

One can encrypt/decrypt a piece of data, meaning that the original text can be retrieved back. However, retrieval of plain text isn’t possible if data is hashed once.

Ref: Santosh Nandakumar
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from UNDERCODE TESTING
🦑Cloud Pentesting Cheatsheet🛡

Cloud penetration testing is a crucial skill to identify vulnerabilities in cloud environments like AWS, Azure, and Google Cloud Platform (GCP). This cheatsheet simplifies complex concepts and helps you take your cloud security game to the next level!

📘What’s Inside?
1️⃣ Key Testing Steps:
• Reconnaissance: Identify misconfigured assets, open ports, and exposed services in the cloud.
• Enumeration: Gather details about cloud accounts, storage buckets, APIs, and permissions.
• Exploitation: Simulate attacks by exploiting misconfigurations, weak access controls, or privilege escalation opportunities.
• Post-Exploitation: Assess the impact by reviewing data leakage and persistence mechanisms.

2️⃣ Cloud-specific Vulnerabilities:
• Misconfigured IAM roles and policies leading to unauthorized access.
• Publicly accessible storage buckets exposing sensitive data.
• Weak or absent encryption protocols for data in transit or at rest.
• Exploitable serverless functions (e.g., AWS Lambda) due to insecure coding practices.
• Over-permissive security groups allowing unrestricted traffic.

3️⃣ Essential Tools for Cloud Pentesting:
• ScoutSuite: Multi-cloud security auditing.
• Pacu: AWS exploitation framework for testing security.
• Cloudsploit: Scan configurations for security issues.
• Burp Suite: Analyze APIs in cloud applications.
• Nmap: Detect open ports and vulnerable services in the cloud.
• AWS CLI and GCP CLI: Enumerate configurations directly from the command line.

4️⃣ Best Practices:
• Use least privilege policies for all IAM roles and accounts.
• Enable logging and monitoring through services like AWS CloudTrail or Azure Monitor.
• Apply encryption standards (TLS, AES-256) to protect sensitive data.
• Regularly perform compliance checks using CIS Benchmarks and OWASP Cloud Top 10.

Key Areas to Focus On:

🔑 Authentication and Authorization Flaws:
• Check for mismanaged credentials (e.g., leaked keys or weak passwords).
• Review SSO configurations for potential bypass scenarios.

📂 Storage Misconfigurations:
• Detect open storage buckets or public file access.
• Ensure data is encrypted and access is controlled through proper permissions.

📡 Network Security Risks:
• Audit firewall rules and security groups to detect overly permissive settings.
• Identify exposed management ports (SSH, RDP, etc.).

🔄 Serverless Security Issues:
• Look for weak input validation and insecure API integrations in serverless applications.
• Check timeout and resource limits to mitigate DoS risks.

Ref: Santosh Nandakumar
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from UNDERCODE TESTING
🦑 100 Free Security Tools – Protect Your Digital World for Free! 🚀

Looking to enhance your cybersecurity skills or secure your systems without breaking the bank? Explore this comprehensive list of 100 FREE Security Tools that cover every aspect of cybersecurity, from penetration testing to network security and data protection! 🌍

🔑 What’s Included?

Network Security Tools

Wireshark: Analyze network packets in real-time.

Nmap: Scan networks for vulnerabilities.


Web Security Tools

Burp Suite Community Edition: Test web application security.

ZAP (OWASP): Identify vulnerabilities in web applications.


Endpoint Protection

Malwarebytes Free: Detect and remove malware effectively.

ClamAV: Open-source antivirus for Linux systems.


Penetration Testing Tools

Metasploit Framework: Comprehensive pen-testing platform.

SQLmap: Automate SQL injection testing.


Password Security

KeePass: Securely manage your passwords.

Hashcat: Advanced password recovery tool.


Cloud Security Tools

ScoutSuite: Assess the security of your cloud infrastructure.

CloudSploit: Detect misconfigurations in cloud environments.


Forensic Tools

Autopsy: Analyze digital media for forensic purposes.

FTK Imager: Quickly collect and analyze forensic data.


... and 85 more tools to strengthen your cybersecurity skills!

Ref: In pdf
@UndercodeCommunity
▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁