UNDERCODE TESTING
๐ฆAICaller is a simple-to-use automated bulk calling solution that uses the latest Generative AI technology to trigger phone calls for you and get things done. It can do things like lead qualification, data gathering over phone calls, and much more. It comesโฆ
๐ฆAI Phone Answering Service (Trial)
https://heyrosie.com/
https://youtu.be/8UZ-EvJ2p8Q
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
https://heyrosie.com/
https://youtu.be/8UZ-EvJ2p8Q
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Heyrosie
Rosie AI Call Answering Service | 24/7 Phone Support From $49
Never miss another call with our AI-powered call answering service. 10x better than voicemail. 10x cheaper than a traditional phone answering service.
Forwarded from UNDERCODE TESTING
๐ฆAI Phone Answering Service (Trial)
https://heyrosie.com/
https://youtu.be/8UZ-EvJ2p8Q
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
https://heyrosie.com/
https://youtu.be/8UZ-EvJ2p8Q
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Heyrosie
Rosie AI Call Answering Service | 24/7 Phone Support From $49
Never miss another call with our AI-powered call answering service. 10x better than voicemail. 10x cheaper than a traditional phone answering service.
๐ฆFree AI lab focused on open-source generative audio models:
> open-source generative audio tools to make music production more accessible and fun for everyone.
https://www.harmonai.org/
https://github.com/Harmonai-org/
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
> open-source generative audio tools to make music production more accessible and fun for everyone.
https://www.harmonai.org/
https://github.com/Harmonai-org/
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
GitHub
Harmonai
A Stability AI lab focused on open-source generative audio models - Harmonai
๐ฆ TLS vs SSL: Whatโs the Difference? ๐
In todayโs digital world, securing data in transit is critical. If youโve ever wondered about the difference between SSL (Secure Socket Layer) and TLS (Transport Layer Security), hereโs a simplified breakdown to clarify:
โ What is SSL?
๐ป SSL was the first protocol designed to secure data over the internet.
๐ป Versions like SSL 1.0, 2.0, and 3.0 are now considered outdated and insecure due to vulnerabilities.
๐ TLS (The Modern Standard)
๐ป TLS is the successor to SSL and is widely used today to secure communications.
๐ป Versions like TLS 1.2 and TLS 1.3 offer strong encryption, secure handshakes, and modern algorithms.
๐ Key Differences Between TLS and SSL:
1๏ธโฃ Security:
๐ป TLS is more secure with enhanced features.
๐ป SSL is outdated and vulnerable to modern attacks.
2๏ธโฃ Protocol Versions:
๐ป TLS: 1.0 โ 1.1 โ 1.2 โ 1.3 โ
๐ป SSL: 1.0 โ 2.0 โ 3.0 (all deprecated) โ
3๏ธโฃ Cipher Suites:
๐ป TLS supports stronger and modern cipher suites.
๐ป SSL uses weaker suites that are less secure.
4๏ธโฃ Handshake Process:
๐ป TLS uses a robust and secure handshake process.
๐ป SSL relies on a less secure method.
5๏ธโฃ Key Exchange:
๐ป TLS enables highly secure key exchanges (e.g., Diffie-Hellman and ECDHE).
๐ป SSL primarily relies on older RSA algorithms.
๐ Why Does This Matter?
Using TLS (especially TLS 1.2 or TLS 1.3) ensures:
โ Stronger encryption
โ Better security against cyber attacks
โ Safe data transmission across networks
โ SSL should not be used anymore due to its vulnerabilities.
Ref: Fadi Kazdar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
In todayโs digital world, securing data in transit is critical. If youโve ever wondered about the difference between SSL (Secure Socket Layer) and TLS (Transport Layer Security), hereโs a simplified breakdown to clarify:
โ What is SSL?
๐ป SSL was the first protocol designed to secure data over the internet.
๐ป Versions like SSL 1.0, 2.0, and 3.0 are now considered outdated and insecure due to vulnerabilities.
๐ TLS (The Modern Standard)
๐ป TLS is the successor to SSL and is widely used today to secure communications.
๐ป Versions like TLS 1.2 and TLS 1.3 offer strong encryption, secure handshakes, and modern algorithms.
๐ Key Differences Between TLS and SSL:
1๏ธโฃ Security:
๐ป TLS is more secure with enhanced features.
๐ป SSL is outdated and vulnerable to modern attacks.
2๏ธโฃ Protocol Versions:
๐ป TLS: 1.0 โ 1.1 โ 1.2 โ 1.3 โ
๐ป SSL: 1.0 โ 2.0 โ 3.0 (all deprecated) โ
3๏ธโฃ Cipher Suites:
๐ป TLS supports stronger and modern cipher suites.
๐ป SSL uses weaker suites that are less secure.
4๏ธโฃ Handshake Process:
๐ป TLS uses a robust and secure handshake process.
๐ป SSL relies on a less secure method.
5๏ธโฃ Key Exchange:
๐ป TLS enables highly secure key exchanges (e.g., Diffie-Hellman and ECDHE).
๐ป SSL primarily relies on older RSA algorithms.
๐ Why Does This Matter?
Using TLS (especially TLS 1.2 or TLS 1.3) ensures:
โ Stronger encryption
โ Better security against cyber attacks
โ Safe data transmission across networks
โ SSL should not be used anymore due to its vulnerabilities.
Ref: Fadi Kazdar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Cloud Sec 2025.pdf
1.2 MB
๐ฆCloud Security
๐ The world of cloud computing offers incredible flexibility and scalability, but it also comes with unique challenges in securing your data and infrastructure. ๐ป๐ก
๐ฏ Key Aspects Covered in This Cloud Security Guide:
๐ Identity and Access Management (IAM): Strong authentication & role-based access controls.
๐ Data Protection: Encryption, backup strategies & secure storage.
๐ Network Security: Firewalls, VPNs, and segmentation.
๐ Compliance: Aligning with frameworks like ISO, GDPR, and HIPAA.
๐ Threat Management: Monitoring & mitigating risks with SIEM and IDS.
๐ Incident Response: Proactive planning and fast recovery.
๐ The world of cloud computing offers incredible flexibility and scalability, but it also comes with unique challenges in securing your data and infrastructure. ๐ป๐ก
๐ฏ Key Aspects Covered in This Cloud Security Guide:
๐ Identity and Access Management (IAM): Strong authentication & role-based access controls.
๐ Data Protection: Encryption, backup strategies & secure storage.
๐ Network Security: Firewalls, VPNs, and segmentation.
๐ Compliance: Aligning with frameworks like ISO, GDPR, and HIPAA.
๐ Threat Management: Monitoring & mitigating risks with SIEM and IDS.
๐ Incident Response: Proactive planning and fast recovery.
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆHow Does VPN Work?
๐ What it does: A VPN (Virtual Private Network) secures your internet connection by encrypting your data and hiding your online activity.
โ๏ธ How it works:
The VPN uses encryption protocols (like AES-256) to turn your data into unreadable code, keeping your information safe from hackers and trackers.
It reroutes your internet traffic through a secure server, masking your real IP address and making it look like you're browsing from a different location.
When using unsecured networks (like cafes or airports), the VPN adds an extra layer of protection, preventing hackers from intercepting your sensitive data.
Let me know if the option if you already use a VPN is your day-to-day life.
Ref: Chirag GoswamiChirag Goswami
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ What it does: A VPN (Virtual Private Network) secures your internet connection by encrypting your data and hiding your online activity.
โ๏ธ How it works:
The VPN uses encryption protocols (like AES-256) to turn your data into unreadable code, keeping your information safe from hackers and trackers.
It reroutes your internet traffic through a secure server, masking your real IP address and making it look like you're browsing from a different location.
When using unsecured networks (like cafes or airports), the VPN adds an extra layer of protection, preventing hackers from intercepting your sensitive data.
Let me know if the option if you already use a VPN is your day-to-day life.
Ref: Chirag GoswamiChirag Goswami
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆCollection of about 13 coding problem patterns that I think can be incredibly beneficial for anyone looking to grasp these powerful algorithmic techniques.
1. Substring problem patterns:
- https://lnkd.in/giASrwds
2. Sliding window patterns:
- https://lnkd.in/gjatQ5pK
3. Two pointer patterns:
- https://lnkd.in/gBfWgHYe
4. Backtracking patterns:
- https://lnkd.in/g9csxVa4
- https://lnkd.in/gVkQX5vA
5. Dynamic Programming patterns:
- https://lnkd.in/gbpRU46g
- https://lnkd.in/gcnBActT
6. Binary search patterns:
- https://lnkd.in/gKEm_qUK
7. Tree patterns:
- https://lnkd.in/gKja_D5H
8. Graph patterns:
- https://lnkd.in/gKE6w7Jb
9. Monotonic patterns:
- https://lnkd.in/gdYahWVN
10. Bit manipulation patterns:
- https://lnkd.in/gmMMST5J
11. String question patterns:
- https://lnkd.in/gkNvEi8j
12. DFS and BFS patterns:
- https://lnkd.in/gPgpsgaQ
- https://lnkd.in/gd4ekfQe
13. 14 Coding interview patterns:
- https://lnkd.in/gMZJVkFf
Consistency is the key!
Here are some of the best platforms to practice DSA problems daily.
1. HackerRank
2. LeetCode
3. GeeksforGeeks
5. takeUforward Youtube Channel
- https://lnkd.in/d-UNHu6B
7. Piyush Agarwal Youtube Channel
- https://lnkd.in/dtBth5PF
6. ๐๐ผ๐ฑ๐ฒ ๐ช๐ถ๐๐ต ๐๐ฎ๐ฟ๐ฟ๐ Youtube Channel
- https://lnkd.in/d-Uq-tCn
Ref: Rajat GajbhiyeRajat Gajbhiye
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
1. Substring problem patterns:
- https://lnkd.in/giASrwds
2. Sliding window patterns:
- https://lnkd.in/gjatQ5pK
3. Two pointer patterns:
- https://lnkd.in/gBfWgHYe
4. Backtracking patterns:
- https://lnkd.in/g9csxVa4
- https://lnkd.in/gVkQX5vA
5. Dynamic Programming patterns:
- https://lnkd.in/gbpRU46g
- https://lnkd.in/gcnBActT
6. Binary search patterns:
- https://lnkd.in/gKEm_qUK
7. Tree patterns:
- https://lnkd.in/gKja_D5H
8. Graph patterns:
- https://lnkd.in/gKE6w7Jb
9. Monotonic patterns:
- https://lnkd.in/gdYahWVN
10. Bit manipulation patterns:
- https://lnkd.in/gmMMST5J
11. String question patterns:
- https://lnkd.in/gkNvEi8j
12. DFS and BFS patterns:
- https://lnkd.in/gPgpsgaQ
- https://lnkd.in/gd4ekfQe
13. 14 Coding interview patterns:
- https://lnkd.in/gMZJVkFf
Consistency is the key!
Here are some of the best platforms to practice DSA problems daily.
1. HackerRank
2. LeetCode
3. GeeksforGeeks
5. takeUforward Youtube Channel
- https://lnkd.in/d-UNHu6B
7. Piyush Agarwal Youtube Channel
- https://lnkd.in/dtBth5PF
6. ๐๐ผ๐ฑ๐ฒ ๐ช๐ถ๐๐ต ๐๐ฎ๐ฟ๐ฟ๐ Youtube Channel
- https://lnkd.in/d-Uq-tCn
Ref: Rajat GajbhiyeRajat Gajbhiye
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn
UNDERCODE TESTING
1734092102348.pdf
๐ฆWi-Fi Hacking Notes: Master Wireless Security!
๐ง๐ง๐ง๐ง๐ฉ๐ฉ๐ก๐ก๐ฉ๐ฉ๐ช๐ช๐ช๐ช
Are you curious about wireless network security or aspiring to become a cybersecurity expert? ๐ This guide to Wi-Fi Hacking explores techniques and tools to test the vulnerabilities of wireless networksโethically! ๐ก
๐ What Youโll Learn in These Notes:
1๏ธโฃ Wi-Fi Security Protocols: WEP, WPA, WPA2, WPA3 ๐
2๏ธโฃ Common Attacks:
โข Deauthentication Attack: Disconnect clients from a network.
โข WPS PIN Attack: Exploit weak WPS configurations.
โข Handshake Capturing: Intercept authentication traffic for cracking.
3๏ธโฃ Powerful Tools:
โข Aircrack-ng Suite: A complete toolkit for testing wireless networks.
โข Reaver: Crack WPS PINs.
โข Wireshark: Analyze wireless traffic.
โข Kismet: Detect hidden networks and sniff packets.
4๏ธโฃ Best Practices:
โข Use Kali Linux for a ready-to-go penetration testing environment.
โข Learn command-line techniques to work efficiently.
โข Practice in controlled environments to ensure ethical testing.
โ๏ธ Step-by-Step Process for Ethical Hacking
1๏ธโฃ Identify the Target Network: Use tools like airodump-ng to scan available networks.
2๏ธโฃ Capture the Handshake: Disconnect a user with a deauthentication attack and capture the handshake with tools like aireplay-ng.
3๏ธโฃ Analyze the Handshake: Use tools like Aircrack-ng or Hashcat to brute force or analyze the handshake.
4๏ธโฃ Test for WPS Vulnerabilities: Run tools like Reaver to exploit weak WPS pins.
5๏ธโฃ Analyze Network Traffic: Use Wireshark for packet analysis and identifying potential weaknesses.
๐ก Strengthen Your Wi-Fi Security
โข Use WPA3 or WPA2 with strong passwords.
โข Disable WPS to prevent brute-force attacks.
โข Regularly update your router firmware to patch vulnerabilities.
โข Use a strong SSID name that doesnโt reveal personal information.
๐ง๐ง๐ง๐ง๐ฉ๐ฉ๐ก๐ก๐ฉ๐ฉ๐ช๐ช๐ช๐ช
Are you curious about wireless network security or aspiring to become a cybersecurity expert? ๐ This guide to Wi-Fi Hacking explores techniques and tools to test the vulnerabilities of wireless networksโethically! ๐ก
๐ What Youโll Learn in These Notes:
1๏ธโฃ Wi-Fi Security Protocols: WEP, WPA, WPA2, WPA3 ๐
2๏ธโฃ Common Attacks:
โข Deauthentication Attack: Disconnect clients from a network.
โข WPS PIN Attack: Exploit weak WPS configurations.
โข Handshake Capturing: Intercept authentication traffic for cracking.
3๏ธโฃ Powerful Tools:
โข Aircrack-ng Suite: A complete toolkit for testing wireless networks.
โข Reaver: Crack WPS PINs.
โข Wireshark: Analyze wireless traffic.
โข Kismet: Detect hidden networks and sniff packets.
4๏ธโฃ Best Practices:
โข Use Kali Linux for a ready-to-go penetration testing environment.
โข Learn command-line techniques to work efficiently.
โข Practice in controlled environments to ensure ethical testing.
โ๏ธ Step-by-Step Process for Ethical Hacking
1๏ธโฃ Identify the Target Network: Use tools like airodump-ng to scan available networks.
2๏ธโฃ Capture the Handshake: Disconnect a user with a deauthentication attack and capture the handshake with tools like aireplay-ng.
3๏ธโฃ Analyze the Handshake: Use tools like Aircrack-ng or Hashcat to brute force or analyze the handshake.
4๏ธโฃ Test for WPS Vulnerabilities: Run tools like Reaver to exploit weak WPS pins.
5๏ธโฃ Analyze Network Traffic: Use Wireshark for packet analysis and identifying potential weaknesses.
๐ก Strengthen Your Wi-Fi Security
โข Use WPA3 or WPA2 with strong passwords.
โข Disable WPS to prevent brute-force attacks.
โข Regularly update your router firmware to patch vulnerabilities.
โข Use a strong SSID name that doesnโt reveal personal information.
๐ฆAll Free: Useful payloads and bypass for Web Application Security and Pentest/CTF:
https://github.com/swisskyrepo/PayloadsAllTheThings
https://github.com/swisskyrepo/PayloadsAllTheThings
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆNetwork Protocols: The Unsung Heroes of Communication
Think of networking protocols as the secret language that devices use to talk to each other on a network. They're essential for everything from browsing the web (DNS, TCP/IP, HTTPS) to sending emails (SMTP) and having real-time chats (WebSocket).
Here's a quick rundown of some key protocols:
DNS: Turns website names into computer addresses (IP addresses).
TCP/IP: The power couple of the internet. TCP chops data into packets and ensures reliable delivery, while IP addresses and routes them.
HTTPS: Secures your web browsing with encryption.
SMTP: Delivers your emails efficiently.
WebSocket: Enables real-time chat and data exchange.
DHCP: Assigns IP addresses to devices on a network automatically.
UDP: Prioritizes speed for streaming, gaming, and voice calls.
Understanding these protocols gives you a deeper appreciation for how the digital world works.
Ref: Rocky Bhatia
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Think of networking protocols as the secret language that devices use to talk to each other on a network. They're essential for everything from browsing the web (DNS, TCP/IP, HTTPS) to sending emails (SMTP) and having real-time chats (WebSocket).
Here's a quick rundown of some key protocols:
DNS: Turns website names into computer addresses (IP addresses).
TCP/IP: The power couple of the internet. TCP chops data into packets and ensures reliable delivery, while IP addresses and routes them.
HTTPS: Secures your web browsing with encryption.
SMTP: Delivers your emails efficiently.
WebSocket: Enables real-time chat and data exchange.
DHCP: Assigns IP addresses to devices on a network automatically.
UDP: Prioritizes speed for streaming, gaming, and voice calls.
Understanding these protocols gives you a deeper appreciation for how the digital world works.
Ref: Rocky Bhatia
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆHack Together: The Microsoft Fabric Global AI Hack
Official Repo:
https://github.com/microsoft/Hack-Together-Fabric-AI
๐ฆ๐๐๐ญ๐ฐ๐จ๐ซ๐ค ๐๐ญ๐ญ๐๐๐ค๐ฌ ๐๐ฑ๐ฉ๐ฅ๐๐ข๐ง๐๐
๐น ๐๐๐๐ (๐๐๐ง-๐ข๐ง-๐ญ๐ก๐-๐๐ข๐๐๐ฅ๐) ๐๐ญ๐ญ๐๐๐ค: Interception of communication between two parties by a third party, potentially altering messages (e.g., an attacker intercepts messages between Alice and Bob).
๐น๐๐จ๐จ๐ญ๐ค๐ข๐ญ๐ฌ: Malicious software that provides privileged access to a computer while hiding the attacker's presence (e.g., an attacker installs a rootkit on a server to avoid detection).
๐น ๐๐จ๐ญ๐ง๐๐ญ๐ฌ: Networks of compromised devices controlled by a central entity, used for malicious activities like DDoS attacks (e.g., thousands of infected computers flood a website).
๐น๐๐ ๐๐ฉ๐จ๐จ๐๐ข๐ง๐ : Sending packets with a fake source IP address to impersonate another device or mask traffic origin (e.g., an attacker tricks a server into thinking a request is from a trusted source).
๐น ๐๐๐จ๐ (๐๐ข๐ฌ๐ญ๐ซ๐ข๐๐ฎ๐ญ๐๐ ๐๐๐ง๐ข๐๐ฅ ๐จ๐ ๐๐๐ซ๐ฏ๐ข๐๐): Overwhelming a server with traffic from multiple sources, making it unavailable to legitimate users (e.g., using a botnet to crash a website).
๐น๐๐๐ ๐๐ฉ๐จ๐จ๐๐ข๐ง๐ : Providing false DNS responses to redirect victims to malicious sites, often to steal information (e.g., redirecting users to a fake bank website).
Ref: Praveen Singh
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐น ๐๐๐๐ (๐๐๐ง-๐ข๐ง-๐ญ๐ก๐-๐๐ข๐๐๐ฅ๐) ๐๐ญ๐ญ๐๐๐ค: Interception of communication between two parties by a third party, potentially altering messages (e.g., an attacker intercepts messages between Alice and Bob).
๐น๐๐จ๐จ๐ญ๐ค๐ข๐ญ๐ฌ: Malicious software that provides privileged access to a computer while hiding the attacker's presence (e.g., an attacker installs a rootkit on a server to avoid detection).
๐น ๐๐จ๐ญ๐ง๐๐ญ๐ฌ: Networks of compromised devices controlled by a central entity, used for malicious activities like DDoS attacks (e.g., thousands of infected computers flood a website).
๐น๐๐ ๐๐ฉ๐จ๐จ๐๐ข๐ง๐ : Sending packets with a fake source IP address to impersonate another device or mask traffic origin (e.g., an attacker tricks a server into thinking a request is from a trusted source).
๐น ๐๐๐จ๐ (๐๐ข๐ฌ๐ญ๐ซ๐ข๐๐ฎ๐ญ๐๐ ๐๐๐ง๐ข๐๐ฅ ๐จ๐ ๐๐๐ซ๐ฏ๐ข๐๐): Overwhelming a server with traffic from multiple sources, making it unavailable to legitimate users (e.g., using a botnet to crash a website).
๐น๐๐๐ ๐๐ฉ๐จ๐จ๐๐ข๐ง๐ : Providing false DNS responses to redirect victims to malicious sites, often to steal information (e.g., redirecting users to a fake bank website).
Ref: Praveen Singh
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆYou've probably heard of JWT - Json Web Tokens.
It is a format designed to securely transfer information between two parties, so it is mainly used to authenticate and transmit information in an encrypted way by using different algorithms when it consists of three parts (Header, Payload, and Signature).
I recently visited a website that manages couriers since I myself am waiting for delivery. He is vulnerable, he is not secure, he is "weak." A weakness that I was able to locate was expressed in the fact that the server stores information about couriers (scheduling) for that courier in JWT format. The information inside is by "x" (identifier) and "y" (shipping). There is no defense mechanism in place, which leads to security weakness and damage to credibility.
It turns out (unfortunately) that anyone can edit the payload content (change a shipping ID to data belonging to another user), and without verifying the signature, the server will receive the edited token as valid, which leads to data tampering, exposing details, and also Rxss because it turns out that there is no filtering on user input.
What's more, it's not normal!
The problem with the JWT header is that it contains information such as id and num, for example, while it does not store information about the encryption type (alg) and the type of token (typ) at all. Using a header to store such data is a security weakness because the header is both unsigned and can be easily modified.
Platforms like Portswigger have modules that focus on attacks on jwt that can also be used to learn about secure development
JWT (Algorithm confusion, Header Injections, etc.)
Ref: Adam Kahlon
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
It is a format designed to securely transfer information between two parties, so it is mainly used to authenticate and transmit information in an encrypted way by using different algorithms when it consists of three parts (Header, Payload, and Signature).
I recently visited a website that manages couriers since I myself am waiting for delivery. He is vulnerable, he is not secure, he is "weak." A weakness that I was able to locate was expressed in the fact that the server stores information about couriers (scheduling) for that courier in JWT format. The information inside is by "x" (identifier) and "y" (shipping). There is no defense mechanism in place, which leads to security weakness and damage to credibility.
It turns out (unfortunately) that anyone can edit the payload content (change a shipping ID to data belonging to another user), and without verifying the signature, the server will receive the edited token as valid, which leads to data tampering, exposing details, and also Rxss because it turns out that there is no filtering on user input.
What's more, it's not normal!
The problem with the JWT header is that it contains information such as id and num, for example, while it does not store information about the encryption type (alg) and the type of token (typ) at all. Using a header to store such data is a security weakness because the header is both unsigned and can be easily modified.
Platforms like Portswigger have modules that focus on attacks on jwt that can also be used to learn about secure development
JWT (Algorithm confusion, Header Injections, etc.)
Ref: Adam Kahlon
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆAWS Cloud #tips : The Backbone of Modern Technology!๐
๐ What is AWS (Amazon Web Services)?
AWS is the worldโs most comprehensive and widely adopted cloud platform, offering 200+ fully featured services across compute, storage, databases, networking, AI, IoT, and more. Trusted by millions, AWS enables businesses of all sizes to innovate faster and scale effortlessly.
๐ Why AWS Stands Out:
1๏ธโฃ Global Infrastructure:
โข Operates across 31 geographic regions and 99 Availability Zones, ensuring low latency, reliability, and scalability.
โข Plans for 15 more regions are underway, making AWS one of the largest global networks.
2๏ธโฃ Cost Optimization:
โข AWS follows a pay-as-you-go model, meaning you only pay for what you use.
โข Tools like AWS Cost Explorer and Savings Plans help optimize your cloud spend.
3๏ธโฃ Unmatched Security:
โข Industry-leading security protocols, compliance with over 140 global standards, and data encryption ensure peace of mind.
โข AWS also provides IAM (Identity and Access Management) for granular security control.
4๏ธโฃ Innovation-Driven:
โข AWS offers cutting-edge tools for AI/ML (SageMaker), Big Data (EMR), and Serverless Computing (Lambda).
โข Pioneering advancements in Edge Computing with services like AWS Outposts and Wavelength.
5๏ธโฃ Ease of Use for Developers:
โข A user-friendly console, SDKs, APIs, and CLI make building and managing applications seamless.
โข Offers templates via CloudFormation for infrastructure automation.
๐ป Most Popular AWS Services
โข EC2: Scalable compute power for running applications.
โข S3: Highly durable object storage for backups, data lakes, and archives.
โข RDS & DynamoDB: Managed relational and NoSQL databases.
โข CloudFront: Fast and secure content delivery network.
โข Lambda: Event-driven serverless computing without infrastructure management.
๐ AWS Certification Pathway
AWS certifications validate your skills and open doors to career opportunities. Popular certifications include:
โข AWS Certified Solutions Architect (Associate)
โข AWS Certified Cloud Practitioner
โข AWS Certified DevOps Engineer
๐ Who Uses AWS?
โข Startups: Accelerate development with low upfront costs.
โข Enterprises: Achieve agility and scale globally.
โข Developers & IT Professionals: Innovate and build cutting-edge solutions.
๐ Getting Started:
โข Try AWS Free Tier to explore its services risk-free.
โข Explore AWS tutorials, documentation, and online courses to boost your skills.
Ref: Mahesh GirheMahesh Girhe
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ What is AWS (Amazon Web Services)?
AWS is the worldโs most comprehensive and widely adopted cloud platform, offering 200+ fully featured services across compute, storage, databases, networking, AI, IoT, and more. Trusted by millions, AWS enables businesses of all sizes to innovate faster and scale effortlessly.
๐ Why AWS Stands Out:
1๏ธโฃ Global Infrastructure:
โข Operates across 31 geographic regions and 99 Availability Zones, ensuring low latency, reliability, and scalability.
โข Plans for 15 more regions are underway, making AWS one of the largest global networks.
2๏ธโฃ Cost Optimization:
โข AWS follows a pay-as-you-go model, meaning you only pay for what you use.
โข Tools like AWS Cost Explorer and Savings Plans help optimize your cloud spend.
3๏ธโฃ Unmatched Security:
โข Industry-leading security protocols, compliance with over 140 global standards, and data encryption ensure peace of mind.
โข AWS also provides IAM (Identity and Access Management) for granular security control.
4๏ธโฃ Innovation-Driven:
โข AWS offers cutting-edge tools for AI/ML (SageMaker), Big Data (EMR), and Serverless Computing (Lambda).
โข Pioneering advancements in Edge Computing with services like AWS Outposts and Wavelength.
5๏ธโฃ Ease of Use for Developers:
โข A user-friendly console, SDKs, APIs, and CLI make building and managing applications seamless.
โข Offers templates via CloudFormation for infrastructure automation.
๐ป Most Popular AWS Services
โข EC2: Scalable compute power for running applications.
โข S3: Highly durable object storage for backups, data lakes, and archives.
โข RDS & DynamoDB: Managed relational and NoSQL databases.
โข CloudFront: Fast and secure content delivery network.
โข Lambda: Event-driven serverless computing without infrastructure management.
๐ AWS Certification Pathway
AWS certifications validate your skills and open doors to career opportunities. Popular certifications include:
โข AWS Certified Solutions Architect (Associate)
โข AWS Certified Cloud Practitioner
โข AWS Certified DevOps Engineer
๐ Who Uses AWS?
โข Startups: Accelerate development with low upfront costs.
โข Enterprises: Achieve agility and scale globally.
โข Developers & IT Professionals: Innovate and build cutting-edge solutions.
๐ Getting Started:
โข Try AWS Free Tier to explore its services risk-free.
โข Explore AWS tutorials, documentation, and online courses to boost your skills.
Ref: Mahesh GirheMahesh Girhe
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ