UNDERCODE COMMUNITY
2.67K subscribers
1.23K photos
31 videos
2.65K files
79.3K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
This media is not supported in your browser
VIEW IN TELEGRAM
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#Buffer Overflow Example :

> This is an example of a very bad coding practices
*** that introduces a buffer overflow.

2) The purpose of this code is to serve as a demonstration and exercise for [The Art of Hacking Series and live training..in site xy..
#include <stdio.h>

void secretFunction()
{
printf("Omar's Crappy Function\n");
printf("This is a super secret function!\n");
}

void echo()
{
char buffer[20];

printf("Please enter your name:\n");
scanf("%s", buffer);
printf("You entered: %s\n", buffer);
}

int main()
{
echo();

return 0;
}


The char buffer[20]; is a really bad idea. The rest will be demonstrated in the course.

You can compile this code or use the already-compiled binary [here](https://github.com/The-Art-of-Hacking/h4cker/raw/master/buffer_overflow_example/vuln_program).

3) For 32 bit systems you can use [gcc](https://www.gnu.org/software/gcc/) as shown below:
gcc vuln.c -o vuln -fno-stack-protector

For 64 bit systems

gcc vuln.c -o vuln -fno-stack-protector -m32

-fno-stack-protector disabled the stack protection. Smashing the stack is now allowed. -m32 made sure that the compiled binary is 32 bit. You may need to install some additional libraries to compile 32 bit binaries on 64 bit machines.


@UndercodeTesting
> git sources
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#Bug Bounties :

- [Bug Bounties 101](https://whitton.io/articles/bug-bounties-101-getting-started/)

- [The life of a bug bounty hunter](http://www.alphr.com/features/378577/q-a-the-life-of-a-bug-bounty-hunter)

- [Awesome list of bugbounty cheatsheets](https://github.com/EdOverflow/bugbounty-cheatsheet)

- [Getting Started - Bug Bounty Hunter Methodology](https://www.bugcrowd.com/blog/getting-started-bug-bounty-hunter-methodology)

- [How to Become a Successful Bug Bounty Hunter](https://hackerone.com/blog/what-great-hackers-share)

- [Researcher Resources - How to become a Bug Bounty Hunter](https://forum.bugcrowd.com/t/researcher-resources-how-to-become-a-bug-bounty-hunter/1102)

> git sources
@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#BUG BOUNTIES :

- [Awesome Bug Bounty Writeups](https://github.com/devanshbatham/Awesome-Bugbounty-Writeups)

## Bug Bounty Platforms

- [AntiHACK](https://www.antihack.me/)

- [Bounty Factory](https://bountyfactory.io/)

- [Bountysource](https://www.bountysource.com/)

- [BugbountyHQ](https://www.bugbountyhq.com/)

- [Bugbountyjp](https://bugbounty.jp/)

- [Bugcrowd](https://bugcrowd.com/)

- [CESPPA](https://www.cesppa.com/)

- [Cobalt](https://cobalt.io/)

- [Coder Bounty](http://www.coderbounty.com/)

- [Detectify](https://cs.detectify.com/)

- [FOSS Factory](http://www.fossfactory.org/)

- [FreedomSponsors](https://freedomsponsors.org/)

- [HackenProof](https://hackenproof.com/)

- [Hackerhive](https://hackerhive.io/)

- [HackerOne](https://hackerone.com/)

- [intigriti](https://intigriti.com/)

- [Safehats](https://safehats.com/)

- [Synack](https://www.synack.com/)

- [YesWeHack](https://yeswehack.com/)

@UndercodeTesting
> git sources
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁

πŸ¦‘#Docker Resources-2020 :

> Where to start

- [Basics Γ’β‚¬β€œ Docker, Containers, Hypervisors, CoreOS](http://etherealmind.com/basics-docker-containers-hypervisors-coreos/)

- [Dive Into Docker: From "What is Docker?" to "Hello World"](https://www.youtube.com/watch?v=XeSD17YRijk&list=PL-v3vdeWVEsXT-u0JDQZnM90feU3NE3v8) (60:25) by [@nickjanetakis][nickjanetakis]

- [Docker Curriculum](https://docker-curriculum.com): A comprehensive tutorial for getting started with Docker. Teaches how to use Docker and deploy dockerized apps on AWS with Elastic Beanstalk and Elastic Container Service.

- [Docker Documentation](https://docs.docker.com/)

- [Docker for all - Developers, Testers, DevOps, Product Owners + Videos](https://github.com/machzqcq/docker-for-all) Docker Training Videos for all

- [Docker Jumpstart](https://github.com/odewahn/docker-jumpstart/): a quick introduction

- [Docker Training](https://training.docker.com/) - Includes a free self-paced hands-on tutorial (free registration required or sign-in with DockerHub ID)

- [Katacoda](https://www.katacoda.com/): Learn Docker using Interactive Browser-Based Labs

- [Learn Docker](https://github.com/dwyl/learn-docker) Full environment set up, screenshots, step-by-step tutorial and more resources (video, articles, cheat sheets) by [@dwyl](https://github.com/dwyl)

- [Play With Docker](https://training.play-with-docker.com/) - PWD is a great way to get started with Docker from beginner to advanced users. Docker runs directly in your browser.

- [Play With Moby](http://play-with-moby.com/) - PWM is a web based Moby playground which allows you to try different components of the platform in seconds. It gives you the experience of having a free Alpine Linux Virtual Machine in the cloud where you can build and run Moby projects and even create clusters to experiment.

- [Practical Introduction to Container Terminology](https://developers.redhat.com/blog/2018/02/22/container-terminology-practical-introduction/) The landscape for container technologies is larger than just docker. Without a good handle on the terminology, It can be difficult to grasp the key differences between docker and (pick your favorites, CRI-O, rkt, lxc/lxd) or understand what the Open Container Initiative is doing to standardize container technology.

> git sources
@UndercodeTesting
▁ β–‚ β–„ ο½•π•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁