Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
π¦π§ͺ Interactive Labs for Microsoft Certified: Security Operations Analyst Associate
πΉ Apply Microsoft Defender for Office 365 preset security policies
π§ͺ https://lnkd.in/d6BqZJtv
πΉ Deploy Microsoft Defender for Endpoint
π§ͺ https://lnkd.in/dd_Vj9VT
πΉ Mitigate Attacks with Microsoft Defender for Endpoint
π§ͺ https://lnkd.in/d273kEnd
πΉ Enable Microsoft Defender for Cloud
π§ͺ https://lnkd.in/d_nGMapG
πΉ Mitigate threats using Microsoft Defender for Cloud
π§ͺ https://lnkd.in/drJmedgr
πΉ Create queries for Microsoft Sentinel using Kusto Query Language (KQL)
π§ͺ https://lnkd.in/dQnQ_iEZ
πΉ Configure your Microsoft Sentinel environment
π§ͺ https://lnkd.in/dr4akkUX
πΉ Connect data to Microsoft Sentinel using data connectors
π§ͺ https://lnkd.in/dtRmAwFa
πΉ Connect Windows devices to Microsoft Sentinel using data connectors
π§ͺ https://lnkd.in/dpxmvabA
πΉ Connect Linux hosts to Microsoft Sentinel using data connectors
π§ͺ https://lnkd.in/dua8fHNm
πΉ Create workbooks
π§ͺ https://lnkd.in/dnawKhcP
πΉ Use Repositories in Microsoft Sentinel
π§ͺ https://lnkd.in/daQkDy9N
Ref: Dimitris Chatzidimitris
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
πΉ Apply Microsoft Defender for Office 365 preset security policies
π§ͺ https://lnkd.in/d6BqZJtv
πΉ Deploy Microsoft Defender for Endpoint
π§ͺ https://lnkd.in/dd_Vj9VT
πΉ Mitigate Attacks with Microsoft Defender for Endpoint
π§ͺ https://lnkd.in/d273kEnd
πΉ Enable Microsoft Defender for Cloud
π§ͺ https://lnkd.in/d_nGMapG
πΉ Mitigate threats using Microsoft Defender for Cloud
π§ͺ https://lnkd.in/drJmedgr
πΉ Create queries for Microsoft Sentinel using Kusto Query Language (KQL)
π§ͺ https://lnkd.in/dQnQ_iEZ
πΉ Configure your Microsoft Sentinel environment
π§ͺ https://lnkd.in/dr4akkUX
πΉ Connect data to Microsoft Sentinel using data connectors
π§ͺ https://lnkd.in/dtRmAwFa
πΉ Connect Windows devices to Microsoft Sentinel using data connectors
π§ͺ https://lnkd.in/dpxmvabA
πΉ Connect Linux hosts to Microsoft Sentinel using data connectors
π§ͺ https://lnkd.in/dua8fHNm
πΉ Create workbooks
π§ͺ https://lnkd.in/dnawKhcP
πΉ Use Repositories in Microsoft Sentinel
π§ͺ https://lnkd.in/daQkDy9N
Ref: Dimitris Chatzidimitris
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
lnkd.in
LinkedIn
This link will take you to a page thatβs not on LinkedIn
Forwarded from Exploiting Crew (Pr1vAt3)
π¦ LFIer Tool :
>>>>LFIer>>>> is a powerful tool for detecting >>>>Local File Inclusion (LFI)>>>> vulnerabilities in web applications. By injecting payloads into URL parameters and analyzing responses, it efficiently identifies potential security issues. The tool is designed for flexibility, efficiency, and accuracy, even when scanning sites protected by WAFs or cloud-based defenses.
π >>>>Key Features>>>>
1. >>>>β‘οΈ High Performance>>>>: Async programming ensures rapid, non-blocking requests for large-scale scanning.
2. >>>>π Advanced Detection>>>>: Custom payloads and indicators accurately detect vulnerabilities.
3. >>>>π‘ WAF/Cloud Bypass>>>>: Simulates real browser requests to bypass security measures.
4. >>>>π Custom Payloads>>>>: Allows user-defined payload injection for flexibility.
5. >>>>π Custom Headers>>>>: Mimics client requests or bypasses filters with custom headers.
6. >>>>β±οΈ Rate Limiting>>>>: Prevents server overload by controlling request frequency and batching.
7. >>>>π Flexible Output>>>>: Results in JSON or plain text for seamless integration into pipelines.
8. >>>>π§ Configurability>>>>: Adjustable settings for rate, timeouts, and workers.
9. >>>>π Organized Scans>>>>: Groups results by domain or URL list.
10. >>>>π Easy Updates>>>>: One-click update mechanism ensures the latest features.
π₯ >>>>Installation>>>>
# >>>>For Kali Linux (2024.4+)>>>>
# >>>>Using Virtual Environment (Recommended for Non-Kali Users)>>>>
1. >>>>Create and activate virtual environment:>>>>
2. >>>>Upgrade pip:>>>>
3. >>>>Clone the repository and install dependencies:>>>>
---
π >>>>Payloads & Indicators>>>>
# >>>>Linux Example>>>>
- >>>>Payloads>>>>:
- >>>>Indicators>>>>:
# >>>>Windows Example>>>>
- >>>>Payloads>>>>:
- >>>>Indicators>>>>:
---
π§© >>>>Parameterized URLs>>>>
To find URLs with parameters:
---
π >>>>Usage Examples>>>>
# >>>>Single Domain Scan>>>>
# >>>>Multiple URLs with Custom Rate>>>>
# >>>>Advanced Usage>>>>
- Custom headers:
- JSON output:
---
βοΈ >>>>Important Notes>>>>
- Always activate the virtual environment before using LFIer:
- Regularly update LFIer to keep it effective against new protections:
This tool is a must-have for cybersecurity professionals looking to identify and remediate LFI vulnerabilities efficiently. Happy hunting!
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
>>>>LFIer>>>> is a powerful tool for detecting >>>>Local File Inclusion (LFI)>>>> vulnerabilities in web applications. By injecting payloads into URL parameters and analyzing responses, it efficiently identifies potential security issues. The tool is designed for flexibility, efficiency, and accuracy, even when scanning sites protected by WAFs or cloud-based defenses.
π >>>>Key Features>>>>
1. >>>>β‘οΈ High Performance>>>>: Async programming ensures rapid, non-blocking requests for large-scale scanning.
2. >>>>π Advanced Detection>>>>: Custom payloads and indicators accurately detect vulnerabilities.
3. >>>>π‘ WAF/Cloud Bypass>>>>: Simulates real browser requests to bypass security measures.
4. >>>>π Custom Payloads>>>>: Allows user-defined payload injection for flexibility.
5. >>>>π Custom Headers>>>>: Mimics client requests or bypasses filters with custom headers.
6. >>>>β±οΈ Rate Limiting>>>>: Prevents server overload by controlling request frequency and batching.
7. >>>>π Flexible Output>>>>: Results in JSON or plain text for seamless integration into pipelines.
8. >>>>π§ Configurability>>>>: Adjustable settings for rate, timeouts, and workers.
9. >>>>π Organized Scans>>>>: Groups results by domain or URL list.
10. >>>>π Easy Updates>>>>: One-click update mechanism ensures the latest features.
π₯ >>>>Installation>>>>
# >>>>For Kali Linux (2024.4+)>>>>
git clone https://github.com/Cybersecurity-Ethical-Hacker/lfier.git
cd lfier
pipx install aiohttp
pipx install colorama
pipx install tqdm
# >>>>Using Virtual Environment (Recommended for Non-Kali Users)>>>>
1. >>>>Create and activate virtual environment:>>>>
python3 -m venv venv
source venv/bin/activate
2. >>>>Upgrade pip:>>>>
pip install --upgrade pip
3. >>>>Clone the repository and install dependencies:>>>>
git clone https://github.com/Cybersecurity-Ethical-Hacker/lfier.git
cd lfier
pip install -r requirements.txt
---
π >>>>Payloads & Indicators>>>>
# >>>>Linux Example>>>>
- >>>>Payloads>>>>:
/..\\../..\\../etc/passwd
../../../../../etc/passwd
- >>>>Indicators>>>>:
root:x:0:0:
nobody:x:65534:
# >>>>Windows Example>>>>
- >>>>Payloads>>>>:
C:/boot.ini
- >>>>Indicators>>>>:
[boot loader]
timeout=30
---
π§© >>>>Parameterized URLs>>>>
To find URLs with parameters:
paramspider -d domain.com -s 2>&1 | grep -Ei "https?://" | sort -u | httpx -silent -status-code -mc 200,201,204,401,403 > live_urls.txt
---
π >>>>Usage Examples>>>>
# >>>>Single Domain Scan>>>>
python lfier.py -d "https://domain.com/file.php?parameter=1234"
# >>>>Multiple URLs with Custom Rate>>>>
python lfier.py -l urls.txt -r 5
# >>>>Advanced Usage>>>>
- Custom headers:
python lfier.py -d "https://example.com" -H "User-Agent: CustomAgent"
- JSON output:
python lfier.py -l urls.txt -j -o results.json
---
βοΈ >>>>Important Notes>>>>
- Always activate the virtual environment before using LFIer:
source venv/bin/activate
- Regularly update LFIer to keep it effective against new protections:
python lfier.py -u
This tool is a must-have for cybersecurity professionals looking to identify and remediate LFI vulnerabilities efficiently. Happy hunting!
@UndercodeCommunity
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from UNDERCODE TESTING
WEB APPLICATION PENETRATION TESTING.pdf
13.1 MB
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
β‘οΈ #OpenAI's New Reasoning Model: o3
https://undercodenews.com/openais-new-reasoning-model-o3/
@Undercode_News
https://undercodenews.com/openais-new-reasoning-model-o3/
@Undercode_News
UNDERCODE NEWS
OpenAI's New Reasoning Model: o3 - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Elon Musk vs Sam Altman: A Feud Fueled by #AI Ambitions
https://undercodenews.com/elon-musk-vs-sam-altman-a-feud-fueled-by-ai-ambitions/
@Undercode_News
https://undercodenews.com/elon-musk-vs-sam-altman-a-feud-fueled-by-ai-ambitions/
@Undercode_News
UNDERCODE NEWS
Elon Musk vs Sam Altman: A Feud Fueled by AI Ambitions - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
β‘οΈ #Google #Chrome's New #AI Shield: Protecting You from Online Scams
https://undercodenews.com/google-chromes-new-ai-shield-protecting-you-from-online-scams/
@Undercode_News
https://undercodenews.com/google-chromes-new-ai-shield-protecting-you-from-online-scams/
@Undercode_News
UNDERCODE NEWS
Google Chrome's New AI Shield: Protecting You from Online Scams - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π A Geopolitical Gamble: The US Ban on TP-Link Routers
https://undercodenews.com/a-geopolitical-gamble-the-us-ban-on-tp-link-routers/
@Undercode_News
https://undercodenews.com/a-geopolitical-gamble-the-us-ban-on-tp-link-routers/
@Undercode_News
UNDERCODE NEWS
A Geopolitical Gamble: The US Ban on TP-Link Routers - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π± 7 #Android Widgets to Supercharge Your Phone or #Tablet
https://undercodenews.com/7-android-widgets-to-supercharge-your-phone-or-tablet/
@Undercode_News
https://undercodenews.com/7-android-widgets-to-supercharge-your-phone-or-tablet/
@Undercode_News
UNDERCODE NEWS
7 Android Widgets to Supercharge Your Phone or Tablet - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
#GitHub #Copilot's Free Tier Expands to JetBrains IDEs
https://undercodenews.com/github-copilots-free-tier-expands-to-jetbrains-ides/
@Undercode_News
https://undercodenews.com/github-copilots-free-tier-expands-to-jetbrains-ides/
@Undercode_News
UNDERCODE NEWS
GitHub Copilot's Free Tier Expands to JetBrains IDEs - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from DailyCVE
π΄ SSID Injection Vulnerability in Systeminformation Module (Critical)
https://dailycve.com/ssid-injection-vulnerability-in-systeminformation-module-critical/
@Daily_CVE
https://dailycve.com/ssid-injection-vulnerability-in-systeminformation-module-critical/
@Daily_CVE
DailyCVE
SSID Injection Vulnerability in Systeminformation Module (Critical) - DailyCVE
2024-12-20 : A critical vulnerability exists in the `systeminformation` module, specifically in the `getWindowsIEEE8021x` function. This vulnerability allows attackers to [β¦]
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Lazarus Group's Evolving Tactics: A Deep Dive into Operation DreamJob
https://undercodenews.com/lazarus-groups-evolving-tactics-a-deep-dive-into-operation-dreamjob/
@Undercode_News
https://undercodenews.com/lazarus-groups-evolving-tactics-a-deep-dive-into-operation-dreamjob/
@Undercode_News
UNDERCODE NEWS
Lazarus Group's Evolving Tactics: A Deep Dive into Operation DreamJob - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
Getting Fit for Deep Space: International Space Station Gears Up for Longer Missions
https://undercodenews.com/getting-fit-for-deep-space-international-space-station-gears-up-for-longer-missions/
@Undercode_News
https://undercodenews.com/getting-fit-for-deep-space-international-space-station-gears-up-for-longer-missions/
@Undercode_News
UNDERCODE NEWS
Getting Fit for Deep Space: International Space Station Gears Up for Longer Missions - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from DailyCVE
π΄ Oqtane Framework, Incorrect Access Control, #CVE-2024-XXXX (High)
https://dailycve.com/oqtane-framework-incorrect-access-control-cve-2024-xxxx-high/
@Daily_CVE
https://dailycve.com/oqtane-framework-incorrect-access-control-cve-2024-xxxx-high/
@Daily_CVE
DailyCVE
Oqtane Framework, Incorrect Access Control, CVE-2024-XXXX (High) - DailyCVE
2024-12-20 Oqtane Framework version 6.0.0 is susceptible to an Incorrect Access Control vulnerability. This flaw allows attackers to circumvent passcode [β¦]
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
#Google's Efficiency Push: A Closer Look
https://undercodenews.com/googles-efficiency-push-a-closer-look/
@Undercode_News
https://undercodenews.com/googles-efficiency-push-a-closer-look/
@Undercode_News
UNDERCODE NEWS
Google's Efficiency Push: A Closer Look - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
Forwarded from UNDERCODE NEWS (Copyright & Fact Checker)
π Stop Research Rabbit Holes: Shop Smarter with #Amazon's #AI Shopping Guides
https://undercodenews.com/stop-research-rabbit-holes-shop-smarter-with-amazons-ai-shopping-guides/
@Undercode_News
https://undercodenews.com/stop-research-rabbit-holes-shop-smarter-with-amazons-ai-shopping-guides/
@Undercode_News
UNDERCODE NEWS
Stop Research Rabbit Holes: Shop Smarter with Amazon's AI Shopping Guides - UNDERCODE NEWS
Undercode News was founded in order to provide the most useful information in the world of hacking and technology. Staffed 24/24 hours, seven days a week by a dedicated team in undercode around the world, so it can provide an environment of information andβ¦
π¦Hacking Search Queries :
1. Shodan
A search engine for discovering internet-connected devices such as servers, routers, and IoT devices.
2. ExploitDB
A comprehensive database of publicly available exploits and vulnerabilities for security professionals.
3. Censys
Provides real-time data about devices and servers exposed to the internet, assisting with vulnerability assessments.
4. SecurityTrails
Offers in-depth DNS and domain data, useful for gathering intelligence on domains and their infrastructure.
5. ZoomEye
Similar to Shodan, this search engine focuses on finding devices and services exposed to the internet.
6. VirusTotal
A tool that analyzes files and URLs for potential threats using multiple antivirus engines and tools.
7. Maltego
A powerful tool for open-source intelligence (OSINT) gathering, mapping relationships between people, domains, and networks.
8. Google Dorks
A technique that uses advanced search operators to find specific information on websites, often used in penetration testing.
9. GreyNoise
A threat intelligence platform that helps to identify and filter out background noise in network traffic to focus on real threats.
10. Foca
A tool for gathering metadata from documents, websites, and emails to perform digital reconnaissance and OSINT collection.
11. Recon-ng
A full-featured web reconnaissance framework for open-source intelligence gathering, helping to identify and map online targets.
12. OSINT Framework
A structured framework that categorizes various open-source intelligence tools to help with cyber investigations.
13. TheHarvester
A tool for gathering emails, subdomains, hosts, and other information from public sources to assist with penetration testing.
14. ThreatMiner
A tool for gathering threat intelligence data, including information about malware and attacks, from various sources.
15. Spokeo
A tool for aggregating information about individuals, often used in social engineering and OSINT investigations.
16. Whois Lookup
A query tool for obtaining domain registration information, often used to find the owner of a domain or IP address.
17. Robtex
A network intelligence platform that provides DNS, IP address, and ASN lookup information for network reconnaissance.
18. OpenVAS
An open-source vulnerability scanner used for detecting security issues and weaknesses in networks and systems.
19. Nmap
A network scanning tool that helps detect devices, services, and vulnerabilities within a network, frequently used in penetration testing.
20. Netcraft
A tool for gathering web server information, including the hosting provider and the software stack used by websites.
21. Recon.sh
A simple OSINT tool used for gathering information about a domain, including emails, DNS records, and other associated data.
22. Sublist3r
A fast subdomain enumeration tool used to find subdomains associated with a target domain.
23. Wappalyzer
A tool that helps identify technologies used on websites, such as frameworks, web servers, and content management systems (CMS).
24. BuiltWith
Provides detailed information about the technologies used on websites, including advertising networks, analytics tools, and CMS platforms.
25. Pentesterslab
A collection of resources and tools aimed at penetration testers, focusing on offensive security.
26. Burp Suite
A popular tool used by ethical hackers for web application security testing, including scanning for vulnerabilities.
27. Hydra
A powerful password-cracking tool used for brute-force attacks on network services.
28. Mimikatz
A tool for extracting plaintext passwords, Kerberos tickets, and other sensitive information from Windows systems.
29. Cuckoo Sandbox
An automated malware analysis tool that executes suspicious files in a controlled environment to analyze their behavior.
30. ThreatCrowd
A tool for analyzing and investigating malware, IP addresses, and other threat intelligence data.
31. VirusShare
A malware sample sharing platform useful for gathering information on known malicious files and their characteristics.
32. IBM X-Force Exchange
1. Shodan
A search engine for discovering internet-connected devices such as servers, routers, and IoT devices.
2. ExploitDB
A comprehensive database of publicly available exploits and vulnerabilities for security professionals.
3. Censys
Provides real-time data about devices and servers exposed to the internet, assisting with vulnerability assessments.
4. SecurityTrails
Offers in-depth DNS and domain data, useful for gathering intelligence on domains and their infrastructure.
5. ZoomEye
Similar to Shodan, this search engine focuses on finding devices and services exposed to the internet.
6. VirusTotal
A tool that analyzes files and URLs for potential threats using multiple antivirus engines and tools.
7. Maltego
A powerful tool for open-source intelligence (OSINT) gathering, mapping relationships between people, domains, and networks.
8. Google Dorks
A technique that uses advanced search operators to find specific information on websites, often used in penetration testing.
9. GreyNoise
A threat intelligence platform that helps to identify and filter out background noise in network traffic to focus on real threats.
10. Foca
A tool for gathering metadata from documents, websites, and emails to perform digital reconnaissance and OSINT collection.
11. Recon-ng
A full-featured web reconnaissance framework for open-source intelligence gathering, helping to identify and map online targets.
12. OSINT Framework
A structured framework that categorizes various open-source intelligence tools to help with cyber investigations.
13. TheHarvester
A tool for gathering emails, subdomains, hosts, and other information from public sources to assist with penetration testing.
14. ThreatMiner
A tool for gathering threat intelligence data, including information about malware and attacks, from various sources.
15. Spokeo
A tool for aggregating information about individuals, often used in social engineering and OSINT investigations.
16. Whois Lookup
A query tool for obtaining domain registration information, often used to find the owner of a domain or IP address.
17. Robtex
A network intelligence platform that provides DNS, IP address, and ASN lookup information for network reconnaissance.
18. OpenVAS
An open-source vulnerability scanner used for detecting security issues and weaknesses in networks and systems.
19. Nmap
A network scanning tool that helps detect devices, services, and vulnerabilities within a network, frequently used in penetration testing.
20. Netcraft
A tool for gathering web server information, including the hosting provider and the software stack used by websites.
21. Recon.sh
A simple OSINT tool used for gathering information about a domain, including emails, DNS records, and other associated data.
22. Sublist3r
A fast subdomain enumeration tool used to find subdomains associated with a target domain.
23. Wappalyzer
A tool that helps identify technologies used on websites, such as frameworks, web servers, and content management systems (CMS).
24. BuiltWith
Provides detailed information about the technologies used on websites, including advertising networks, analytics tools, and CMS platforms.
25. Pentesterslab
A collection of resources and tools aimed at penetration testers, focusing on offensive security.
26. Burp Suite
A popular tool used by ethical hackers for web application security testing, including scanning for vulnerabilities.
27. Hydra
A powerful password-cracking tool used for brute-force attacks on network services.
28. Mimikatz
A tool for extracting plaintext passwords, Kerberos tickets, and other sensitive information from Windows systems.
29. Cuckoo Sandbox
An automated malware analysis tool that executes suspicious files in a controlled environment to analyze their behavior.
30. ThreatCrowd
A tool for analyzing and investigating malware, IP addresses, and other threat intelligence data.
31. VirusShare
A malware sample sharing platform useful for gathering information on known malicious files and their characteristics.
32. IBM X-Force Exchange