UNDERCODE COMMUNITY
2.7K subscribers
1.24K photos
31 videos
2.65K files
81.2K links
🦑 Undercode World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE


Youtube.com/Undercode
by Undercode.help
Download Telegram
Forwarded from UNDERCODE CEH NOTES
🦑Companies that specialize in gathering online intelligence
from both public and private sources:

• InsideView (https://www.insideview.com)

• NewsEdge (www.newsedge.com)

• Semantic Visions (www.semantic-visions.com)

• DigitalGlobe (www.digitalglobe.com)

▁ ▂ ▄ U𝕟𝔻Ⓔ𝐫Ć𝔬𝓓ⓔ ▄ ▂ ▁
Forwarded from UNDERCODE TESTING
This media is not supported in your browser
VIEW IN TELEGRAM
An interesting active new evasion technique that is bypassing almost all security solutions so far, taking advantage of the recovery functionality in applications. This is groundbreaking as most if not all endpoint solutions aren’t armed with any file recovery techniques and would fail to detect this attack vector.

Microsoft has structured word documents similar to archives, constructing any doc file with 3 sections; starting with local file headers, central file headers and end directory records. These 3 sections are linked backward starting from the end to the header. Manipulating any of these sections makes it harder for any endpoint or email security solution to unpack and identify the issue, but recoverable by its intending application after its too late.

VirusTotal:
https://www.virustotal.com/gui/file/3245ca6c7f9f78e6b8fc0f05e7821e4b4e0d1abf24719d9457a7640f3f447c58/details