UNDERCODE TESTING
311 subscribers
311 photos
24 videos
173 files
29.8K links
๐Ÿฆ‘ World first platform which Collect & Analyzes every New hacking method.

+ Free AI Practice.

(New Bug Bounty Methods, Tools Updates, AI & Courses).

โœจ Services: Undercode.help/services

โœจyoutube.com/undercode

@Undercode_Testing
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
DNS&DHCP_HACK.pdf
2.1 MB
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Cookie stealer which can then be used for session hijacking and Bypassing 2 Factor Authentication:

>> How Does it work?
Big-Papa utilizes malicious javascript code injection...and then makes a GET Request(with cookies) to the Python Web server running on the attacker machine

Note That you need to be man in the middle in order to inject the malicious javascript Code and then steal cookies of the website that the victim is currently visting

For testing purposes copy the Javascript code from the bgp.js file without the script tags and execute in the console of the browser

You can use Bettercap in-order to become man-in-the-middle using bettercap or use arp spoof and then run Big-Papa to inject Javascript

>> For HTTPS?
Big-Papa will work Perfectly against HTTP websites but For HTTPS you can use sslstrip to Downgrade it to HTTP and then utilize Big-Papa

*SSLstrip --> https://github.com/moxie0/sslstrip.git

Still some websites use HTTP and thus their data including Passwords can be read in Clear text but we need to steal cookies in some cases in order to Bypass 2-Factor-Authentication

๐Ÿ„ธ๐Ÿ„ฝ๐Ÿ…‚๐Ÿ…ƒ๐Ÿ„ฐ๐Ÿ„ป๐Ÿ„ป๐Ÿ„ธ๐Ÿ…‚๐Ÿ„ฐ๐Ÿ…ƒ๐Ÿ„ธ๐Ÿ„พ๐Ÿ„ฝ & ๐Ÿ…๐Ÿ…„๐Ÿ„ฝ :

1๏ธโƒฃ git clone https://github.com/vrikodar/Big-Papa.git

2๏ธโƒฃcd Big-Papa

3๏ธโƒฃchmod +x install.sh

4๏ธโƒฃ ./install.sh

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from UNDERCODE COMMUNITY (UNDERCODER)
Useful ?
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘๐—ฆ๐—ข๐—ฃ๐˜€ (๐—ฆ๐˜๐—ฎ๐—ป๐—ฑ๐—ฎ๐—ฟ๐—ฑ ๐—ข๐—ฝ๐—ฒ๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—ฃ๐—ฟ๐—ผ๐—ฐ๐—ฒ๐—ฑ๐˜‚๐—ฟ๐—ฒ๐˜€) / ๐—ฃ๐—น๐—ฎ๐˜†๐—ฏ๐—ผ๐—ผ๐—ธ๐˜€ / ๐—ฅ๐˜‚๐—ป๐—ฏ๐—ผ๐—ผ๐—ธ๐˜€โœจ

A playbook, also known as a standard operating procedure (SOP), consists of a set of guidelines to handle security incidents and alerts in the SOC.

Incident response methodologies typically involve creating standard operating procedures (SOPs), playbooks, and runbooks to guide teams through the incident response process.

These gudelines provide easy to use operational incident best practices. These cheat sheets are dedicated to incident handling and cover multiple fields in which a CERT team can be involved.

Source: https://lnkd.in/eudq_jJi
Thanks to Societe Generale

โœ…Worm Infection: https://lnkd.in/ez-kq98Y
โœ…Social Engineering: https://lnkd.in/e_FJbxDP
โœ…Information Leakage: https://lnkd.in/eeN8KX8g
โœ…Insider Abuse: https://lnkd.in/ep4p_THk
โœ…Customer Phishing: https://lnkd.in/ekTfY7vz
โœ…Scam: https://lnkd.in/eUHwG3fF
โœ…Trademark infringement: https://lnkd.in/e3P3xfeb
โœ…Phishing: https://lnkd.in/eYTi3RQ8
โœ…Ransomware: https://lnkd.in/eRkctdQn
โœ…Large_scale_compromise: https://lnkd.in/eYFF43b4
โœ…3rd-party_compromise: https://lnkd.in/e8SAu5MT
โœ…Windows Intrusion: https://lnkd.in/eXCpcx9V
โœ…Unix Linux lntrusionDetection: https://lnkd.in/eHkm6MMe
โœ…DDOS: https://lnkd.in/eQ7zZzVt
โœ…MaliciousNetworkBehaviour: https://lnkd.in/ewVZy2cs
โœ…Website-Defacement: https://lnkd.in/eraNiHcH
โœ…WindowsMalwareDetection: https://lnkd.in/ewEx_C6Y
โœ…Blackmail: https://lnkd.in/eW3zGcPs
โœ…SmartphoneMalware.pdf: https://lnkd.in/ezjyY4G9

Ref:
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘๐€ ๐…๐ซ๐ž๐ž ๐€๐œ๐ญ๐ข๐ฏ๐ž ๐ƒ๐ข๐ซ๐ž๐œ๐ญ๐จ๐ซ๐ฒ ๐๐ž๐ง๐ญ๐ž๐ฌ๐ญ ๐‹๐€๐๐ฌ!

Game of Active Directory is an Open-Source project developed by Orange Cyber Defense that provides a vulnerable Active Directory environment.

It's designed for security professionals to practice and improve their skills in a controlled setting:

โ€ข Hands-on learning without risking a production environment.
โ€ข Opportunity to explore advanced attack and defense techniques.
โ€ข Offers a cost-effective way to build cybersecurity expertise.
โ€ข Facilitates a deeper understanding of AD security best practices.

Source: https://lnkd.in/gxN-_nTw

Kindly note that GOAD is intentionally designed to be highly vulnerable. It is strongly advised to refrain from replicating its configuration for production environments.

GOAD helps threat hunters simulate AD attacks, refine detection skills, and test response strategies in a safe, controlled environment.

Discover over 10+ essential data analysis techniques for effective threat hunting in my "Cyber Threat Hunt 101" YouTube series, explained simply: https://lnkd.in/gkVB6B2j

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Forwarded from Exploiting Crew (Pr1vAt3)
Forwarded from Exploiting Crew (Pr1vAt3)
๐Ÿฆ‘Real Ethical Hacking in 43 Hours: Your Fast-Track to Cybersecurity Mastery
Elevate your cybersecurity career with our comprehensive ethical hacking course.
Key Topics Covered:

* Ethical Hacking Foundations
* Introduction to Ethical Hacking
* Ethical Hacking Steps
* Creating Your Ethical Hacking Lab
* Operating System Fundamentals
* Vulnerability Assessment
* OSINT Techniques
* Storage Media
* Linux Basics
* Linux Shell
* Linux Processes
* Linux Permissions
* Network Security Concepts
* Packet Management Systems
* Network Security
* Linux File System
* Working with Archives
* Working with Processes
* Working with Users
* Networking Fundamentals
* Network Capture
* Network Scanning
* Advanced Networking Topics
* Information Gathering
* Web Application Hacking
* Detecting Web Vulnerabilities
* The Importance of Programming
* C++ and C
* SQL and Relational Databases
* Functions in C++
* Ethical Hacking for Data Scientists
* Ethical Hacking for SQL Datatypes
* Learning Python for Ethical Hacking

Gain hands-on experience with industry-standard tools like Kali Linux, Metasploit, and Nmap. Prepare for and ace certifications like CSEH and CEH.

Download Link: https://lnkd.in/dnXx6G6H

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘Free Data Leak Checker:

๐Ÿ’ช CVEs scan
โ˜‘๏ธ Works with powerful APIs
๐Ÿ”— Works too with Google Dorks
๐Ÿ”Ž Checks your password in Word Lists
๐Ÿ‘€ Checks the last pastes in Pastebin
๐Ÿ“„ Output to txt, docx, pdf, xlsx, json, html, xml, db
๐Ÿ”’ Output to encrypted files
๐Ÿ“ฆ Sends result files to multiples Buckets S3
๐Ÿ“ Upload the result files to Google Drive
๐Ÿ“ก Cab send result files by SSH (work with EC2)
๐Ÿ“ข Notify by Telegram and e-mail
๐Ÿ“Œ Includes option to hide passwords for demonstrations
๐Ÿ•’ Works with scheduled scans
๐Ÿ” Possible to execute loop scans

https://github.com/loseys/Oblivion
๐Ÿฆ‘1)JS-Tap: Weaponizing JavaScript for Red Teams
https://lnkd.in/gKUUNrKN

2)Automating the Setup of a Bug Bounty Toolkit
https://lnkd.in/gkAN5KJh

3)VOIP Penetration Testing Checklist
https://lnkd.in/gz6iJqG8

4)Find Website Vulnerabilities with One Hacking Tool
https://lnkd.in/giNT2tGr

5)Easy Way To Root Your Virtual Device :)
https://lnkd.in/gTCX9_Zk

6)LetsDefend Walkthrough: Kernel Exploit Challenge
https://lnkd.in/gWjzjUaN

7)TryHackMe Writeup โ€” Corridor
https://lnkd.in/g462KWdP

8)HTB: Editorial Writeup / Walkthrough
https://lnkd.in/gCQgrzy4

9)Lookup THM Walkthrough
https://lnkd.in/gk87hb_H

10)ITI + CyberTalents DFIR Bootcamp CTF Write ups
https://lnkd.in/gpTJuVim

Ref: Saumadip Mandal
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘FREE Videos for Learning ICS/OT Cyber Security! ๐Ÿ“ฝ

Learning doesn't have to be hard!

My YouTube channel now hosts 42 videos on ICS/OT cyber security.

Just to help you!

Haven't checked out my YouTube channel yet?

Here's where to start...

1. Getting Started in ICS/OT Cyber Security - 20+ Hours - Part 1 (Course Introduction)

https://lnkd.in/ee6QjZEn

2. OSINT for ICS/OT - Complete 10+ Hour Course - Part 1 (Course Introduction)

https://lnkd.in/eia63NDc

3. Industrial (ICS/OT) Cyber Security Certifications

https://lnkd.in/eErhErQJ

4. Hacking ICS/OT (& IT) with ChatGPT

https://lnkd.in/ebiidVry

5. Nmap Scanning for ICS/OT (& IT) - Part 1

https://lnkd.in/eHvMD2zJ

6. Getting Started in ICS/OT Cyber Security - 20+ Hours - Part 10 (Intro to ICS/OT Penetration Testing)

https://lnkd.in/eeSm7rxD

7. ICS/OT Packet Analysis Tools

https://lnkd.in/e4nSThTm

8. Using Shodan to Find ICS/OT (& IT) Assets

https://lnkd.in/eQgJ-xKa

9. Getting Started in ICS/OT Cyber Security - LIVE Recruiter Edition

https://lnkd.in/eACU5WNQ

10. Learn ICS/OT Incident Response w/ Backdoors & Breaches

https://lnkd.in/ePgnwPbA

Ref: Mike Holcomb
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘AICaller

is a simple-to-use automated bulk calling solution that uses the latest Generative AI technology to trigger phone calls for you and get things done. It can do things like lead qualification, data gathering over phone calls, and much more. It comes with a powerful API, low cost pricing and free trial.

https://aicaller.io/

https://youtu.be/1MEK5Q_Yyao

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–