UNDERCODE TESTING
308 subscribers
311 photos
24 videos
173 files
29.5K links
🦑 World first platform which Collect & Analyzes every New hacking method.

+ Free AI Practice.

(New Bug Bounty Methods, Tools Updates, AI & Courses).

Services: Undercode.help/services

youtube.com/undercode

@Undercode_Testing
Download Telegram
HACKERS ONLY:

Essential Ports for Network Protocols & Services

HTTP (80) & HTTPS (443) - Web traffic essentials.
SSH (22) - Secure remote access.
FTP (21) - File transfers made easy.
DNS (53) - Resolving domain names.
MySQL (3306) - Database connectivity.
Kubernetes API (6443) - Managing containerized applications.
Docker Daemon API (2375/2376) - Container management and orchestration.

MongoDB (27017) - NoSQL database operations.
NGINX (80/443) - Web server flexibility.
Grafana (3000) & Prometheus (9090) - Monitoring and visualization.
Tomcat (8080) & Apache Kafka (9092) - Application server and messaging.
Redis (6379) - In-memory data structure store.

RDP (3389) - Remote desktop protocol for Windows.
ElasticSearch API (9200) - Search engine capabilities.
Jenkins (8080) - Continuous integration and delivery.
SMTP (25) - Email services.

Source:
https://www.linkedin.com/posts/ibrahim-mahamat-adoum-654413180_networking-itsecurity-devops-activity-7261381940568641537-MW0C?utm_source=share&utm_medium
🎩 Pro's Acts
(Source: Linkedin)
Now it's Free Limited, Official Cisco Intrusion Detection & Prevention course:

YOU Will Learn:

Describe Cisco Secure Firewall Threat Defense

Describe Cisco Secure Firewall

Threat Defense Deployment Options

Describe management options for Cisco Secure Firewall Threat Defense

Configure basic initial settings on Cisco Secure Firewall Threat Defense

Configure high availability on Cisco

Secure Firewall Threat Defense

Configure basic Network Address

Translation on Cisco Secure

Firewall Threat Defense

Describe Cisco Secure Firewall Threat Defense policies and explain how different policies influence packet processing through the device

Configure Discovery Policy on Cisco Secure Firewall Threat Defense

Configure and explain prefilter and tunnel rules in prefilter policy
Configure an access control policy on Cisco Secure Firewall Threat Defense

Configure security intelligence on Cisco Secure Firewall Threat Defense

Configure file policy on Cisco Secure Firewall Threat Defense
Configure Intrusion Policy on Cisco Secure Firewall Threat Defense
Perform basic threat analysis using Cisco Secure Firewall Management Center

Perform basic management and system administration tasks on Cisco Secure Firewall Threat Defense

Perform basic traffic flow troubleshooting on Cisco Secure Firewall Threat Defense

Manage Cisco Secure Firewall Threat Defense with Cisco Secure Firewall Threat Defense Manager

ACCESS:

https://www.linkedin.com/learning/cisco-network-security-intrusion-detection-and-prevention/what-you-should-know
A good crypto trading bot:

> https://github.com/freqtrade/freqtrade <
Forwarded from UNDERCODE COMMUNITY (dvm)
What is the Tor Nodes Safety Level in 2024 ?
Final Results
71%
1% unsecure
0%
50%
14%
90% Anonymous
14%
Happy new year (I'm a beginer)😊
What operating system does your AirPods run?

Sounds like a weird question.
Until you realize you have the equivalent processing power of an iPhone 4 in each ear.🙈

Bluetooth audio SoCs are seldom talked about, but a fascinating field.

AirPods specifically run RTKit, a Real-time Operating System targeting small ARM chips, written mostly in C++.

Small Real-time os(s) are often used in audio devices and peripherals, as the slightest hiccup in scheduling would be immediately (aka audibly) obvious. Timings are extremely tight.

Much of the public knowledge about RTKit comes from the Asahi Linux project.
RTKit firmware is actually bundled into iOS updates; a simple extraction of the firmware will show numerous .im4p files (which are really just packed Mach-O).
Enable Security Defaults in Microsoft Entra ID:

1. Sign in to Microsoft Entra admin center

2. Expand Identity

3. Select Overview

4. Click on Properties

5. Select Manage security defaults

6. Set Security defaults to Enabled

7.Click Save

Note: If your organization uses Conditional Access policies, you are prevented from enabling Security Defaults. You can use Conditional Access to configure custom policies that enable the same behavior 1 as those provided by Security Defaults.  
🦑Biggest collections of free cybersecurity resources, here are some top options:

1. Exploit Databases
Exploit-DB: A massive archive of public exploits and software vulnerabilities.

Packet Storm Security: Exploits, tools, and advisories.
0day.today: Exploits and security-related content (registration may be required).

2. Cybersecurity News and CVE Updates
Undercode: Dedicated to cybersecurity, hacking, and tech news.

DailyCVE: A curated resource for the latest CVEs and vulnerability information.

3. Open Source Intelligence (OSINT) Tools
OSINT Framework: A curated collection of OSINT tools and resources.

Maltego Community Edition: OSINT and link analysis software.

4. Cybersecurity Learning Platforms
Hack The Box: Free labs for ethical hacking and pentesting (community edition).

TryHackMe: Interactive hacking and cybersecurity challenges with many free rooms.

OverTheWire: Linux and cybersecurity wargames.

5. Malware and Threat Analysis
VirusShare: Massive collection of malware samples for researchers.

Hybrid Analysis: Free malware analysis service.

ANY.RUN: Free interactive sandbox for analyzing malware.

6. Cybersecurity Tools and Frameworks

Kali Linux: Penetration testing operating system with a large collection of pre-installed tools.

Parrot Security OS: Another Linux distribution for security and privacy.

Metasploit: Penetration testing framework with free options.

7. Online Libraries and Knowledge Bases
MITRE ATT&CK: Knowledge base of adversary tactics and techniques.
CVE Details: Comprehensive vulnerability database.
CyberChef: Cybersecurity and encryption toolkit.

8. Forums and Communities
Reddit: r/cybersecurity: Discussions, resources, and updates.
BleepingComputer: Forums and guides for malware removal and security.

9. Threat Intelligence Platforms
AlienVault OTX: Free threat-sharing platform.
Cisco Talos Intelligence: Free threat intelligence resources.