UNDERCODE TESTING
311 subscribers
311 photos
24 videos
173 files
29.8K links
๐Ÿฆ‘ World first platform which Collect & Analyzes every New hacking method.

+ Free AI Practice.

(New Bug Bounty Methods, Tools Updates, AI & Courses).

โœจ Services: Undercode.help/services

โœจyoutube.com/undercode

@Undercode_Testing
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Free ๐—ฉ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐˜† ๐— ๐—ฎ๐—ป๐—ฎ๐—ด๐—ฒ๐—บ๐—ฒ๐—ป๐˜, ๐—ฆ๐—ฐ๐—ฎ๐—ป๐—ป๐—ถ๐—ป๐—ด ๐—ง๐—ผ๐—ผ๐—น๐˜€ ๐—ฎ๐—ป๐—ฑ ๐—ง๐—ฟ๐—ฎ๐—ถ๐—ป๐—ถ๐—ป๐—ด๐˜€ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฐ ๐Ÿ•ต๏ธ Vulnerability management is important in cybersecurity as it helps reduce risk, maintain compliance, protect assets, enable proactive defense, manage reputation, and achieve cost savings. Here's a curated list of resources I prepared to help you delve deeper into this topic.

โœ… ๐Ÿญ. Vulnerability management: https://lnkd.in/e_GaRhWZ
Checklist:

ใ€‹ https:://DailyCVE.com (AI powered Checker & Analysis)โœ…

https://lnkd.in/eyM7VJEs โญ VM 101 by CrowdStrike: https://lnkd.in/e_HY3Z_J
Vulnerability Assessment 101: https://lnkd.in/eRkz-hMe
Vulnerability Scanning Tools: https://lnkd.in/gbKnkgdt
OWASP Vulnerability Management Guide: https: //lnkd.in/ebEB4HHa
SANS VM Resources: https://lnkd.in/ePGveFcd

โœ… ๐Ÿฎ. ๐—š๐—ฟ๐—ฒ๐—ฒ๐—ป๐—ฏ๐—ผ๐—ป๐—ฒ ๐—ข๐—ฝ๐—ฒ๐—ป๐—ฉ๐—”๐—ฆ Download Link: https://www.openvas.org/
Installation Guide: https://lnkd.in/eFB78JTQ

โœ… ๐Ÿฏ. ๐—ง๐—ฒ๐—ป๐—ฎ๐—ฏ๐—น๐—ฒ ๐—ก๐—ฒ๐˜€๐˜€๐˜‚๐˜€ ๐—˜๐˜€๐˜€๐—ฒ๐—ป๐˜๐—ถ๐—ฎ๐—น๐˜€ Download Link: https://lnkd.in/gzNsE_kW
Tenable University: https://lnkd.in/dt9t4iVs
Training: https://lnkd.in/gQEUxFeu

โœ… ๐Ÿฐ. ๐—ค๐˜‚๐—ฎ๐—น๐˜†๐˜€ Link: https://lnkd.in/ezytw_UB
Training: https://lnkd.in/gvNKJnni
VM for Dummies eBook : https://lnkd.in/e2ed9XxS

โœ… ๐Ÿฑ. ๐—ฅ๐—ฎ๐—ฝ๐—ถ๐—ฑ ๐Ÿณ ๐—œ๐—ป๐˜€๐—ถ๐—ด๐—ต๐˜๐—ฉ๐—  Vulnerability Management Process : https://lnkd.in/eCe5RHtR โญ Nexpose Link: https://lnkd.in/gdARCttE
InsightVM Link: https://lnkd.in/gCtiQgyA
Training: https://lnkd.in/g3Q5i6fT

โœ… ๐Ÿฒ. ๐—”๐—ด๐—ฒ๐—ป๐˜๐—น๐—ฒ๐˜€๐˜€ ๐—ฉ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐˜† ๐—ฆ๐—ฐ๐—ฎ๐—ป๐—ป๐—ฒ๐—ฟ ๐—ณ๐—ผ๐—ฟ ๐—Ÿ๐—ถ๐—ป๐˜‚๐˜…/๐—™๐—ฟ๐—ฒ๐—ฒ๐—•๐—ฆ๐——: https://vuls.io/

โœ… ๐Ÿณ. ๐—ฉ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐˜† ๐——๐—ฎ๐˜๐—ฎ๐—ฏ๐—ฎ๐˜€๐—ฒ / ๐——๐—ฎ๐˜๐—ฎ ๐˜€๐—ผ๐˜‚๐—ฟ๐—ฐ๐—ฒ National Vulnerability Database: https://nvd.nist.gov/
Full Listing: https://lnkd.in/gSNNgY9W
Top-50-vendors: https://lnkd.in/eTqY7bxG
CVE Details: https://lnkd.in/gXm_2Z5h
CVE Report: https://cve.report/
Miter CVE: https://cve.mitre.org/
Miter CWE: https://cwe.mitre.org/
Exploit Prediction Scoring System (EPSS): https://lnkd.in/e3EndP-3
Vulnerability search: https://vulners.com/
Vulnerability database: https://vuldb.com/
Known Exploited Vulnerabilities:https://lnkd.in/gHAFJEtS
Cyberscan : https://lnkd.in/eRS6W_w3

โœ… ๐Ÿด. ๐—–๐—ฉ๐—ฆ๐—ฆ ๐—–๐—ฎ๐—น๐—ฐ๐˜‚๐—น๐—ฎ๐˜๐—ผ๐—ฟ V3 Link: https://lnkd.in/gNqYyqKx
V4 Link: https://lnkd.in/eRd_ggVT

โœ… ๐Ÿต. ๐—•๐˜‚๐—ด ๐—•๐—ผ๐˜‚๐—ป๐˜๐˜† ๐—ฃ๐—ฟ๐—ผ๐—ด๐—ฟ๐—ฎ๐—บ๐˜€: find vulnerability and get paid - https://lnkd.in/esUdfjD9
Mozilla Observatory: https://lnkd.in/e7AbJDEh
The Mozilla Observatory has helped over 240,000 websites by teaching developers, system administrators, and security professionals how to configure their sites safely and securely. Source: https://lnkd.in/emMQ- Zhm


Ref: Mohamad Hamadi
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
Media is too big
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Windows Defender Bypass 2024 with AES-Encrypted Malicious DLL.

Hello everyone,
Since a lot of you guys enjoyed the last video, I decided to create another bypass techniqueโ€”this time using AES encryption for the shellcode. To make it more interesting, I incorporated the shellcode into a malicious DLL and executed it using another process.

Hereโ€™s how it works:

I created a simple file, test.exe (the process I mentioned), which loads the malicious DLL containing the encrypted shellcode. This is achieved using the LoadLibraryA() function and the GetProcAddress() function which is essential for loading any DLL and their exported functions into a process's memory. Once loaded, the DLL decrypts and executes the shellcode.

This time malicious DLL contained raw encrypted shellcode stored on disk. The encryption prevents detection by Windows Defender. In my previous approach, the shellcode was hosted on a server, making it a staged payload. While experimenting, I also tried XOR to obfuscate the shellcode like last time. However, it was consistently detected for some reason I still donโ€™t understand.XORing the shellcode and AES encrypting it share a similar concept though.I might be wrong on this one, forgive me if I am.

This method can be implemented in various ways. One approach is to inject the DLL into another process using its PID or using this AES method to just execute the malicious exe to run the shellcode in memory without loading the dll. This technique has been used by APTs as a means of achieving persistence on compromised systems they target.

I used multiple resources from the internet. All the code used do not belong to me. I added custom logic(like calling the exported function) and tweaked it a little bit to make it work like the way I wanted it to. I give credit to the internet.Hope you guys find this useful!

Ref: Dhanush Arvind
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘๐—๐’๐’ ๐“๐ก๐ซ๐จ๐ฎ๐ ๐ก ๐‡๐‘๐„๐… ๐”๐‘๐‹๐ฌ ๐Ÿ‘‡

I often see applications that let their users control URLs which are reflected back in the DOM as part of the HREF tag

Most of the time these features let you:

โ€ข set the integration URL with a 3rd party service
โ€ข customize your profile page with a link to your own blog/website
โ€ข link your account to you social media profile

While sometimes developers use HTML encoding on quotes to block attackers from escaping the tag, there are several ways to trigger XSS inside href tags <without> escaping them.

One of them is to provide a valid URL format (to bypass server-side validation) but use the javascript protocol (instead of http which is what most developers would expect)

Note however that this won't work if the target="_blank" is specified

Ref: Andrei Agape
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘
DSA is so easy when you follow these 6 steps:


๐Ÿญ. ๐—™๐—ผ๐—ฐ๐˜‚๐˜€ ๐—ผ๐—ป ๐——๐—ฒ๐—ฝ๐˜๐—ต ๐—ผ๐˜ƒ๐—ฒ๐—ฟ ๐—•๐—ฟ๐—ฒ๐—ฎ๐—ฑ๐˜๐—ต:
- Don't solve 500 coding problems aimlessly. Master around 100 core problems deeply instead.
- 40 Problems on Array, Strings, LinkedList, Stack & Queue, Binary search, Trees, Graph, Sorting and Searching: https://lnkd.in/djnaPkeD
- 40 Problems on Dynamic Programming (DP), Backtracking, Hashing, Heap, Tries, and Greedy Algorithms: https://lnkd.in/dF3h-Khk

๐Ÿฎ. ๐—–๐—ฟ๐—ฒ๐—ฎ๐˜๐—ฒ ๐—ฎ ๐—น๐—ถ๐˜€๐˜ ๐—ผ๐—ณ ๐—ธ๐—ฒ๐˜† ๐—พ๐˜‚๐—ฒ๐˜€๐˜๐—ถ๐—ผ๐—ป๐˜€:
- Use resources like "Strivers A2Z DSA Sheet" by Raj Vikramaditya to curate around 100 core problems.
- https://lnkd.in/dQMGy9zF (Strivers)

๐Ÿฏ. ๐— ๐—ฎ๐˜€๐˜๐—ฒ๐—ฟ ๐—ฒ๐—ฎ๐—ฐ๐—ต ๐—ฑ๐—ฎ๐˜๐—ฎ ๐˜€๐˜๐—ฟ๐˜‚๐—ฐ๐˜๐˜‚๐—ฟ๐—ฒ:
- Understand and implement them by hand. Know how they work internally to ace interview questions.
- Fundamentals, Intermediate, Advance DSA topics: https://lnkd.in/d4ws9xfr

๐Ÿฐ. ๐—ฃ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐—ฐ๐—ฒ ๐˜„๐—ถ๐˜๐—ต ๐—ฆ๐—ฝ๐—ฎ๐—ฐ๐—ฒ๐—ฑ ๐—ฅ๐—ฒ๐—ฝ๐—ฒ๐˜๐—ถ๐˜๐—ถ๐—ผ๐—ป:
- Revisit problems after 3 days, a week, and 15 days. Break down solutions instead of rote memorization.
- 3:7:15 Rule for DSA: https://lnkd.in/dW6a8wcg

๐Ÿฑ. ๐—œ๐—ฑ๐—ฒ๐—ป๐˜๐—ถ๐—ณ๐˜† ๐—ฟ๐—ฒ๐˜‚๐˜€๐—ฎ๐—ฏ๐—น๐—ฒ ๐˜๐—ฒ๐—ฐ๐—ต๐—ป๐—ถ๐—พ๐˜‚๐—ฒ๐˜€ ๐—ฎ๐—ป๐—ฑ ๐—ฐ๐—ผ๐—ฑ๐—ฒ ๐—ฏ๐—น๐—ผ๐—ฐ๐—ธ๐˜€:
- Isolate common patterns like Binary Search or Depth First Search for focused practice.
- 20 DSA patterns: https://lnkd.in/d9GCezMm
- 14 problem solving patterns: https://lnkd.in/daysVFSz
- DSA questions patterns: https://lnkd.in/d3rRHTfE

๐Ÿฒ. ๐—˜๐˜…๐—ฝ๐—ฎ๐—ป๐—ฑ ๐—ถ๐—ป๐˜๐—ผ ๐—•๐—ฟ๐—ฒ๐—ฎ๐—ฑ๐˜๐—ต:
- Once you've mastered core problems and techniques, tackle a wider range of questions. Keep it realistic and relevant to interview scenarios.
- 16 Important algorithms problems: https://lnkd.in/dfjm8ked
- Tips to solve any DSA question by understanding patterns: https://lnkd.in/d9GVyfBY

Additional tips
Practice on paper: Practice whiteboard interviews to improve your planning and coding skills without relying on an IDE. Itโ€™s a practical way to get ready for real interviews.

Ref: Rajat Gajbhiye
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘๐Ÿ” Mastering DNS & DHCP Penetration Testing: Protect Your Networkโ€™s Core!

DNS (Domain Name System) and DHCP (Dynamic Host Configuration Protocol) are foundational to network operations. However, their vulnerabilities can make them prime targets for cyberattacks. Understanding how to test and secure these protocols is a critical skill for any cybersecurity professional.

Common DNS Vulnerabilities & Attacks:

1๏ธโƒฃ DNS Spoofing/Poisoning: Alters DNS responses to redirect users to malicious websites.
2๏ธโƒฃ DNS Tunneling: Exfiltrates data or establishes backdoors via DNS queries.
3๏ธโƒฃ Cache Poisoning: Manipulates DNS cache entries to disrupt or redirect traffic.
4๏ธโƒฃ Zone Transfer Exploitation: Misuses misconfigured servers to access sensitive DNS records.

Common DHCP Vulnerabilities & Attacks:

1๏ธโƒฃ DHCP Starvation Attack: Exhausts IP leases, causing network disruptions.
2๏ธโƒฃ Rogue DHCP Server Attack: Deploys unauthorized DHCP servers to provide malicious configurations.
3๏ธโƒฃ Man-in-the-Middle (MITM) Attacks: Exploits DHCP to intercept sensitive data.
4๏ธโƒฃ IP Address Spoofing: Mimics authorized devices to gain network access.

Steps to Perform DNS & DHCP Penetration Testing:

1๏ธโƒฃ Reconnaissance:
โ€ข Use tools like Dig, DNSRecon, and Fierce to identify DNS configurations.
โ€ข Scan for active DHCP servers using DHCPig or Yersinia.

2๏ธโƒฃ Vulnerability Analysis:
โ€ข Check for weak configurations in DNS records (e.g., open zone transfers).
โ€ข Identify rogue DHCP servers or insufficient IP allocations.

3๏ธโƒฃ Exploitation:
โ€ข Simulate DNS Spoofing or Cache Poisoning to test resilience.
โ€ข Perform DHCP Starvation or Rogue Server attacks in a controlled environment.

4๏ธโƒฃ Remediation:
โ€ข Harden DNS configurations (disable unused services, restrict zone transfers).
โ€ข Enable DHCP snooping and IP source guard to prevent rogue DHCP servers.

Pro Tip for Defenders:
โ€ข Implement DNSSEC (Domain Name System Security Extensions) to validate DNS responses.
โ€ข Regularly monitor and test DHCP and DNS servers for vulnerabilities.

๐Ÿ“Œ Remember: Always test ethically with proper authorization!

๐Ÿ” DNS and DHCP are the backbone of every network. Securing them not only prevents breaches but ensures smooth operations for businesses.
Forwarded from Exploiting Crew (Pr1vAt3)
DNS&DHCP_HACK.pdf
2.1 MB
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Cookie stealer which can then be used for session hijacking and Bypassing 2 Factor Authentication:

>> How Does it work?
Big-Papa utilizes malicious javascript code injection...and then makes a GET Request(with cookies) to the Python Web server running on the attacker machine

Note That you need to be man in the middle in order to inject the malicious javascript Code and then steal cookies of the website that the victim is currently visting

For testing purposes copy the Javascript code from the bgp.js file without the script tags and execute in the console of the browser

You can use Bettercap in-order to become man-in-the-middle using bettercap or use arp spoof and then run Big-Papa to inject Javascript

>> For HTTPS?
Big-Papa will work Perfectly against HTTP websites but For HTTPS you can use sslstrip to Downgrade it to HTTP and then utilize Big-Papa

*SSLstrip --> https://github.com/moxie0/sslstrip.git

Still some websites use HTTP and thus their data including Passwords can be read in Clear text but we need to steal cookies in some cases in order to Bypass 2-Factor-Authentication

๐Ÿ„ธ๐Ÿ„ฝ๐Ÿ…‚๐Ÿ…ƒ๐Ÿ„ฐ๐Ÿ„ป๐Ÿ„ป๐Ÿ„ธ๐Ÿ…‚๐Ÿ„ฐ๐Ÿ…ƒ๐Ÿ„ธ๐Ÿ„พ๐Ÿ„ฝ & ๐Ÿ…๐Ÿ…„๐Ÿ„ฝ :

1๏ธโƒฃ git clone https://github.com/vrikodar/Big-Papa.git

2๏ธโƒฃcd Big-Papa

3๏ธโƒฃchmod +x install.sh

4๏ธโƒฃ ./install.sh

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE COMMUNITY (UNDERCODER)
Useful ?
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘๐—ฆ๐—ข๐—ฃ๐˜€ (๐—ฆ๐˜๐—ฎ๐—ป๐—ฑ๐—ฎ๐—ฟ๐—ฑ ๐—ข๐—ฝ๐—ฒ๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ฃ๐—ฟ๐—ผ๐—ฐ๐—ฒ๐—ฑ๐˜‚๐—ฟ๐—ฒ๐˜€) / ๐—ฃ๐—น๐—ฎ๐˜†๐—ฏ๐—ผ๐—ผ๐—ธ๐˜€ / ๐—ฅ๐˜‚๐—ป๐—ฏ๐—ผ๐—ผ๐—ธ๐˜€โœจ

A playbook, also known as a standard operating procedure (SOP), consists of a set of guidelines to handle security incidents and alerts in the SOC.

Incident response methodologies typically involve creating standard operating procedures (SOPs), playbooks, and runbooks to guide teams through the incident response process.

These gudelines provide easy to use operational incident best practices. These cheat sheets are dedicated to incident handling and cover multiple fields in which a CERT team can be involved.

Source: https://lnkd.in/eudq_jJi
Thanks to Societe Generale

โœ…Worm Infection: https://lnkd.in/ez-kq98Y
โœ…Social Engineering: https://lnkd.in/e_FJbxDP
โœ…Information Leakage: https://lnkd.in/eeN8KX8g
โœ…Insider Abuse: https://lnkd.in/ep4p_THk
โœ…Customer Phishing: https://lnkd.in/ekTfY7vz
โœ…Scam: https://lnkd.in/eUHwG3fF
โœ…Trademark infringement: https://lnkd.in/e3P3xfeb
โœ…Phishing: https://lnkd.in/eYTi3RQ8
โœ…Ransomware: https://lnkd.in/eRkctdQn
โœ…Large_scale_compromise: https://lnkd.in/eYFF43b4
โœ…3rd-party_compromise: https://lnkd.in/e8SAu5MT
โœ…Windows Intrusion: https://lnkd.in/eXCpcx9V
โœ…Unix Linux lntrusionDetection: https://lnkd.in/eHkm6MMe
โœ…DDOS: https://lnkd.in/eQ7zZzVt
โœ…MaliciousNetworkBehaviour: https://lnkd.in/ewVZy2cs
โœ…Website-Defacement: https://lnkd.in/eraNiHcH
โœ…WindowsMalwareDetection: https://lnkd.in/ewEx_C6Y
โœ…Blackmail: https://lnkd.in/eW3zGcPs
โœ…SmartphoneMalware.pdf: https://lnkd.in/ezjyY4G9

Ref:
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘๐€ ๐…๐ซ๐ž๐ž ๐€๐œ๐ญ๐ข๐ฏ๐ž ๐ƒ๐ข๐ซ๐ž๐œ๐ญ๐จ๐ซ๐ฒ ๐๐ž๐ง๐ญ๐ž๐ฌ๐ญ ๐‹๐€๐๐ฌ!

Game of Active Directory is an Open-Source project developed by Orange Cyber Defense that provides a vulnerable Active Directory environment.

It's designed for security professionals to practice and improve their skills in a controlled setting:

โ€ข Hands-on learning without risking a production environment.
โ€ข Opportunity to explore advanced attack and defense techniques.
โ€ข Offers a cost-effective way to build cybersecurity expertise.
โ€ข Facilitates a deeper understanding of AD security best practices.

Source: https://lnkd.in/gxN-_nTw

Kindly note that GOAD is intentionally designed to be highly vulnerable. It is strongly advised to refrain from replicating its configuration for production environments.

GOAD helps threat hunters simulate AD attacks, refine detection skills, and test response strategies in a safe, controlled environment.

Discover over 10+ essential data analysis techniques for effective threat hunting in my "Cyber Threat Hunt 101" YouTube series, explained simply: https://lnkd.in/gkVB6B2j

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–