๐ฆHacking Search Queries :
1. Shodan
A search engine for discovering internet-connected devices such as servers, routers, and IoT devices.
2. ExploitDB
A comprehensive database of publicly available exploits and vulnerabilities for security professionals.
3. Censys
Provides real-time data about devices and servers exposed to the internet, assisting with vulnerability assessments.
4. SecurityTrails
Offers in-depth DNS and domain data, useful for gathering intelligence on domains and their infrastructure.
5. ZoomEye
Similar to Shodan, this search engine focuses on finding devices and services exposed to the internet.
6. VirusTotal
A tool that analyzes files and URLs for potential threats using multiple antivirus engines and tools.
7. Maltego
A powerful tool for open-source intelligence (OSINT) gathering, mapping relationships between people, domains, and networks.
8. Google Dorks
A technique that uses advanced search operators to find specific information on websites, often used in penetration testing.
9. GreyNoise
A threat intelligence platform that helps to identify and filter out background noise in network traffic to focus on real threats.
10. Foca
A tool for gathering metadata from documents, websites, and emails to perform digital reconnaissance and OSINT collection.
11. Recon-ng
A full-featured web reconnaissance framework for open-source intelligence gathering, helping to identify and map online targets.
12. OSINT Framework
A structured framework that categorizes various open-source intelligence tools to help with cyber investigations.
13. TheHarvester
A tool for gathering emails, subdomains, hosts, and other information from public sources to assist with penetration testing.
14. ThreatMiner
A tool for gathering threat intelligence data, including information about malware and attacks, from various sources.
15. Spokeo
A tool for aggregating information about individuals, often used in social engineering and OSINT investigations.
16. Whois Lookup
A query tool for obtaining domain registration information, often used to find the owner of a domain or IP address.
17. Robtex
A network intelligence platform that provides DNS, IP address, and ASN lookup information for network reconnaissance.
18. OpenVAS
An open-source vulnerability scanner used for detecting security issues and weaknesses in networks and systems.
19. Nmap
A network scanning tool that helps detect devices, services, and vulnerabilities within a network, frequently used in penetration testing.
20. Netcraft
A tool for gathering web server information, including the hosting provider and the software stack used by websites.
21. Recon.sh
A simple OSINT tool used for gathering information about a domain, including emails, DNS records, and other associated data.
22. Sublist3r
A fast subdomain enumeration tool used to find subdomains associated with a target domain.
23. Wappalyzer
A tool that helps identify technologies used on websites, such as frameworks, web servers, and content management systems (CMS).
24. BuiltWith
Provides detailed information about the technologies used on websites, including advertising networks, analytics tools, and CMS platforms.
25. Pentesterslab
A collection of resources and tools aimed at penetration testers, focusing on offensive security.
26. Burp Suite
A popular tool used by ethical hackers for web application security testing, including scanning for vulnerabilities.
27. Hydra
A powerful password-cracking tool used for brute-force attacks on network services.
28. Mimikatz
A tool for extracting plaintext passwords, Kerberos tickets, and other sensitive information from Windows systems.
29. Cuckoo Sandbox
An automated malware analysis tool that executes suspicious files in a controlled environment to analyze their behavior.
30. ThreatCrowd
A tool for analyzing and investigating malware, IP addresses, and other threat intelligence data.
31. VirusShare
A malware sample sharing platform useful for gathering information on known malicious files and their characteristics.
32. IBM X-Force Exchange
1. Shodan
A search engine for discovering internet-connected devices such as servers, routers, and IoT devices.
2. ExploitDB
A comprehensive database of publicly available exploits and vulnerabilities for security professionals.
3. Censys
Provides real-time data about devices and servers exposed to the internet, assisting with vulnerability assessments.
4. SecurityTrails
Offers in-depth DNS and domain data, useful for gathering intelligence on domains and their infrastructure.
5. ZoomEye
Similar to Shodan, this search engine focuses on finding devices and services exposed to the internet.
6. VirusTotal
A tool that analyzes files and URLs for potential threats using multiple antivirus engines and tools.
7. Maltego
A powerful tool for open-source intelligence (OSINT) gathering, mapping relationships between people, domains, and networks.
8. Google Dorks
A technique that uses advanced search operators to find specific information on websites, often used in penetration testing.
9. GreyNoise
A threat intelligence platform that helps to identify and filter out background noise in network traffic to focus on real threats.
10. Foca
A tool for gathering metadata from documents, websites, and emails to perform digital reconnaissance and OSINT collection.
11. Recon-ng
A full-featured web reconnaissance framework for open-source intelligence gathering, helping to identify and map online targets.
12. OSINT Framework
A structured framework that categorizes various open-source intelligence tools to help with cyber investigations.
13. TheHarvester
A tool for gathering emails, subdomains, hosts, and other information from public sources to assist with penetration testing.
14. ThreatMiner
A tool for gathering threat intelligence data, including information about malware and attacks, from various sources.
15. Spokeo
A tool for aggregating information about individuals, often used in social engineering and OSINT investigations.
16. Whois Lookup
A query tool for obtaining domain registration information, often used to find the owner of a domain or IP address.
17. Robtex
A network intelligence platform that provides DNS, IP address, and ASN lookup information for network reconnaissance.
18. OpenVAS
An open-source vulnerability scanner used for detecting security issues and weaknesses in networks and systems.
19. Nmap
A network scanning tool that helps detect devices, services, and vulnerabilities within a network, frequently used in penetration testing.
20. Netcraft
A tool for gathering web server information, including the hosting provider and the software stack used by websites.
21. Recon.sh
A simple OSINT tool used for gathering information about a domain, including emails, DNS records, and other associated data.
22. Sublist3r
A fast subdomain enumeration tool used to find subdomains associated with a target domain.
23. Wappalyzer
A tool that helps identify technologies used on websites, such as frameworks, web servers, and content management systems (CMS).
24. BuiltWith
Provides detailed information about the technologies used on websites, including advertising networks, analytics tools, and CMS platforms.
25. Pentesterslab
A collection of resources and tools aimed at penetration testers, focusing on offensive security.
26. Burp Suite
A popular tool used by ethical hackers for web application security testing, including scanning for vulnerabilities.
27. Hydra
A powerful password-cracking tool used for brute-force attacks on network services.
28. Mimikatz
A tool for extracting plaintext passwords, Kerberos tickets, and other sensitive information from Windows systems.
29. Cuckoo Sandbox
An automated malware analysis tool that executes suspicious files in a controlled environment to analyze their behavior.
30. ThreatCrowd
A tool for analyzing and investigating malware, IP addresses, and other threat intelligence data.
31. VirusShare
A malware sample sharing platform useful for gathering information on known malicious files and their characteristics.
32. IBM X-Force Exchange
A threat intelligence sharing platform where cybersecurity professionals can access and share information about threats and vulnerabilities.
33. AlienVault OTX
An open threat intelligence platform that provides a community-driven collection of actionable cybersecurity data.
34. Honeyd
A honeypot tool for simulating different types of computer systems and services to capture network-based attacks.
35. LogRhythm
A security information and event management (SIEM) tool used for monitoring and analyzing log data for suspicious activity.
36. Snort
A widely-used open-source intrusion detection system (IDS) that analyzes network traffic for malicious activity.
37. Suricata
A high-performance IDS/IPS (Intrusion Prevention System) and network security monitoring tool used to detect and block threats in real-time.
38. ZAP (OWASP Zed Attack Proxy)
A popular open-source security testing tool used to find vulnerabilities in web applications through penetration testing.
39. Social-Engineer Toolkit (SET)
A framework for automating social engineering attacks such as phishing, credential harvesting, and exploitation.
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
33. AlienVault OTX
An open threat intelligence platform that provides a community-driven collection of actionable cybersecurity data.
34. Honeyd
A honeypot tool for simulating different types of computer systems and services to capture network-based attacks.
35. LogRhythm
A security information and event management (SIEM) tool used for monitoring and analyzing log data for suspicious activity.
36. Snort
A widely-used open-source intrusion detection system (IDS) that analyzes network traffic for malicious activity.
37. Suricata
A high-performance IDS/IPS (Intrusion Prevention System) and network security monitoring tool used to detect and block threats in real-time.
38. ZAP (OWASP Zed Attack Proxy)
A popular open-source security testing tool used to find vulnerabilities in web applications through penetration testing.
39. Social-Engineer Toolkit (SET)
A framework for automating social engineering attacks such as phishing, credential harvesting, and exploitation.
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
UNDERCODE TESTING
Free
๐ฆSOC Automation Matrix: Capabilities and Gaps!
A structured framework to evaluate and optimize SOC automation potential to pinpoint critical areas for automation, implement targeted strategies, and significantly enhance threat response capabilities.
The matrix is organized into categories containing various automation capabilities. Each capability includes:
โข Description: A brief overview of the capability.
โข Techniques: Technology-agnostic ideas for implementation.
โข Examples: Relevant workflow templates.
โข References: Additional research contributing to capability.
This tool offers a platform-agnostic approach and delivers an independent reference point for us to assess what security automation can achieve and plan the next steps.
Source: https://tinesio.notion.site/4fd14ccf93e7408c8faf96c5aca8c3fd?v=ec12309e0f42446e83c08565c5dc52b2
The SOC Automation Capability Matrix connects threat hunting with data analysis by automating how security data is collected, processed, and enriched.
Ref: Dr. Meisam Eslahi
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
A structured framework to evaluate and optimize SOC automation potential to pinpoint critical areas for automation, implement targeted strategies, and significantly enhance threat response capabilities.
The matrix is organized into categories containing various automation capabilities. Each capability includes:
โข Description: A brief overview of the capability.
โข Techniques: Technology-agnostic ideas for implementation.
โข Examples: Relevant workflow templates.
โข References: Additional research contributing to capability.
This tool offers a platform-agnostic approach and delivers an independent reference point for us to assess what security automation can achieve and plan the next steps.
Source: https://tinesio.notion.site/4fd14ccf93e7408c8faf96c5aca8c3fd?v=ec12309e0f42446e83c08565c5dc52b2
The SOC Automation Capability Matrix connects threat hunting with data analysis by automating how security data is collected, processed, and enriched.
Ref: Dr. Meisam Eslahi
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Tines_io on Notion
SOC Automation Capability Matrix | Notion
The Automation Capability Matrix describes common activities which most security operations centers can automate
๐ฆ๐
๐๐๐ 100% off #cybersecurity udemy course.
๐ Total 100+ hours learning content.
๐จcoupon code limit 100 or 1000 enrolments only.
CompTIA IT Fundamentals Exam FC0-U61 Simplified
(coupon code: AD897D891A9EF032AC18)
https://lnkd.in/gAbDPmr3
The #ISO 26000 Master Class: Empowering Ethical Leadership (coupon code: 0EBD8F6DFC2FF2DD905C)
https://lnkd.in/gt-_n2sy
IP Addressing and Subnetting - Hands-on Learning Approach (coupon code: 50A2C30D761734BE585A)
https://lnkd.in/gvTMBrKK
#CompTIA A+ (220-1102) Core 2 Practice Exams (coupon code: B3CA5A52F5C136D00A0E)
https://lnkd.in/gdMWx2cU
CompTIA A+ (220-1101) Core 1 Practice Exams (coupon code: DEA036405FE7E1908703)
https://lnkd.in/gnfwPir5
The Complete ISO 9001:2015 Master Class (coupon code: C2EC38DEDFFCED88471C)
https://lnkd.in/gKEBXYBN
Ref: Ahmad Parvez
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ Total 100+ hours learning content.
๐จcoupon code limit 100 or 1000 enrolments only.
CompTIA IT Fundamentals Exam FC0-U61 Simplified
(coupon code: AD897D891A9EF032AC18)
https://lnkd.in/gAbDPmr3
The #ISO 26000 Master Class: Empowering Ethical Leadership (coupon code: 0EBD8F6DFC2FF2DD905C)
https://lnkd.in/gt-_n2sy
IP Addressing and Subnetting - Hands-on Learning Approach (coupon code: 50A2C30D761734BE585A)
https://lnkd.in/gvTMBrKK
#CompTIA A+ (220-1102) Core 2 Practice Exams (coupon code: B3CA5A52F5C136D00A0E)
https://lnkd.in/gdMWx2cU
CompTIA A+ (220-1101) Core 1 Practice Exams (coupon code: DEA036405FE7E1908703)
https://lnkd.in/gnfwPir5
The Complete ISO 9001:2015 Master Class (coupon code: C2EC38DEDFFCED88471C)
https://lnkd.in/gKEBXYBN
Ref: Ahmad Parvez
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
๐ฆVideo Link Injection Vulnerability:
The application is vulnerable to a link injection attack in the email content generated from the contact form. This vulnerability allows an attacker to inject malicious links into form fields, such as the "First Name" field, which are then included in the system-generated email. A successful exploitation can lead to phishing attacks, where users are redirected to fraudulent websites that may steal sensitive information like login credentials.
Ref: Aditay Kumar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
The application is vulnerable to a link injection attack in the email content generated from the contact form. This vulnerability allows an attacker to inject malicious links into form fields, such as the "First Name" field, which are then included in the system-generated email. A successful exploitation can lead to phishing attacks, where users are redirected to fraudulent websites that may steal sensitive information like login credentials.
Ref: Aditay Kumar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ฆFREE LABS RED TEAM/BLUE TEAM and CTF SKILLS TO 2025:
Share with your network and friends.
ยท Attack-Defense - https://attackdefense.com
ยท Alert to win - https://alf.nu/alert1
ยท Buffer Overflow Labs - https://lnkd.in/eNbEWYh
ยท CryptoHack - https://cryptohack.org/
ยท CMD Challenge - https://cmdchallenge.com
ยท Cyberdefenders - https://lnkd.in/dVcmjEw8
ยท Damn Vulnerable Repository - https://lnkd.in/dEitQx6H
ยท Defend The Web - https://defendtheweb.net/
ยท Exploitation Education - https://exploit.education
ยท Google CTF - https://lnkd.in/e46drbz8
ยท HackTheBox - https://www.hackthebox.com
ยท Hacker101 - https://ctf.hacker101.com
ยท Hacking-Lab - https://hacking-lab.com/
ยท ImmersiveLabs - https://immersivelabs.com
ยท Infinity Learning CWL - https://lnkd.in/dbx-VhXu
ยท LetsDefend- https://letsdefend.io/
ยท NewbieContest - https://lnkd.in/ewBk6fU5
ยท OverTheWire - http://overthewire.org
ยท Practical Pentest Labs - https://lnkd.in/esq9Yuv5
ยท Pentestlab - https://pentesterlab.com
ยท Penetration Testing Practice Labs - https://lnkd.in/e6wVANYd
ยท PentestIT LAB - https://lab.pentestit.ru
ยท PicoCTF - https://picoctf.com
ยท PWNABLE - https://lnkd.in/eMEwBJzn
ยท Root-Me - https://www.root-me.org
ยท Red Team Exercises - https://lnkd.in/dMBfz-Sp
ยท Root in Jail - http://rootinjail.com
ยท SANS Challenger - https://lnkd.in/e5TAMawK
ยท SmashTheStack - https://lnkd.in/eVn9rP9p
ยท The Cryptopals Crypto Challenges - https://cryptopals.com
ยท Try Hack Me - https://tryhackme.com
ยท Vulnhub - https://www.vulnhub.com
ยท Vulnmachine - https://lnkd.in/eJ2e_kD
ยท W3Challs - https://w3challs.com
ยท WeChall - http://www.wechall.net
ยท Websploit - https://websploit.org/
ยท Zenk-Security - https://lnkd.in/ewJ5rNx2
Ref: Joas A Santos
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Share with your network and friends.
ยท Attack-Defense - https://attackdefense.com
ยท Alert to win - https://alf.nu/alert1
ยท Buffer Overflow Labs - https://lnkd.in/eNbEWYh
ยท CryptoHack - https://cryptohack.org/
ยท CMD Challenge - https://cmdchallenge.com
ยท Cyberdefenders - https://lnkd.in/dVcmjEw8
ยท Damn Vulnerable Repository - https://lnkd.in/dEitQx6H
ยท Defend The Web - https://defendtheweb.net/
ยท Exploitation Education - https://exploit.education
ยท Google CTF - https://lnkd.in/e46drbz8
ยท HackTheBox - https://www.hackthebox.com
ยท Hacker101 - https://ctf.hacker101.com
ยท Hacking-Lab - https://hacking-lab.com/
ยท ImmersiveLabs - https://immersivelabs.com
ยท Infinity Learning CWL - https://lnkd.in/dbx-VhXu
ยท LetsDefend- https://letsdefend.io/
ยท NewbieContest - https://lnkd.in/ewBk6fU5
ยท OverTheWire - http://overthewire.org
ยท Practical Pentest Labs - https://lnkd.in/esq9Yuv5
ยท Pentestlab - https://pentesterlab.com
ยท Penetration Testing Practice Labs - https://lnkd.in/e6wVANYd
ยท PentestIT LAB - https://lab.pentestit.ru
ยท PicoCTF - https://picoctf.com
ยท PWNABLE - https://lnkd.in/eMEwBJzn
ยท Root-Me - https://www.root-me.org
ยท Red Team Exercises - https://lnkd.in/dMBfz-Sp
ยท Root in Jail - http://rootinjail.com
ยท SANS Challenger - https://lnkd.in/e5TAMawK
ยท SmashTheStack - https://lnkd.in/eVn9rP9p
ยท The Cryptopals Crypto Challenges - https://cryptopals.com
ยท Try Hack Me - https://tryhackme.com
ยท Vulnhub - https://www.vulnhub.com
ยท Vulnmachine - https://lnkd.in/eJ2e_kD
ยท W3Challs - https://w3challs.com
ยท WeChall - http://www.wechall.net
ยท Websploit - https://websploit.org/
ยท Zenk-Security - https://lnkd.in/ewJ5rNx2
Ref: Joas A Santos
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ๐CyberAdvent Day 21: pyDescribeSDDL - Simplify Windows SDDL Analysis
๐ Ever struggled with decoding SDDL strings during audits or pentests? With pyDescribeSDDL, you can transform Security Descriptor Definition Language (SDDL) strings into readable insights effortlessly!
๐ What is pyDescribeSDDL?
pyDescribeSDDL is a Python tool designed to parse and describe the contents of SDDL strings, making it easier to analyze Access Control Entries (ACEs), Access Control Lists (ACLs), and associated SIDs and GUIDs.
๐ Key Features
1๏ธโฃ Human-readable summaries: Use the --summary option to output clear and concise access information.
2๏ธโฃ ACE Parsing: Supports detailed analysis of all major ACE types
3๏ธโฃ SID Resolution: Automatically resolve well-known SIDs to their human-readable names.
4๏ธโฃ GUID Parsing: Decode well-known GUIDs for easier interpretation.
๐ Check out pyDescribeSDDL here: https://github.com/p0dalirius/pyDescribeSDDL
Ref: Rรฉmi Gascou (Podalirius)Rรฉmi Gascou
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
๐ Ever struggled with decoding SDDL strings during audits or pentests? With pyDescribeSDDL, you can transform Security Descriptor Definition Language (SDDL) strings into readable insights effortlessly!
๐ What is pyDescribeSDDL?
pyDescribeSDDL is a Python tool designed to parse and describe the contents of SDDL strings, making it easier to analyze Access Control Entries (ACEs), Access Control Lists (ACLs), and associated SIDs and GUIDs.
๐ Key Features
1๏ธโฃ Human-readable summaries: Use the --summary option to output clear and concise access information.
2๏ธโฃ ACE Parsing: Supports detailed analysis of all major ACE types
3๏ธโฃ SID Resolution: Automatically resolve well-known SIDs to their human-readable names.
4๏ธโฃ GUID Parsing: Decode well-known GUIDs for easier interpretation.
๐ Check out pyDescribeSDDL here: https://github.com/p0dalirius/pyDescribeSDDL
Ref: Rรฉmi Gascou (Podalirius)Rรฉmi Gascou
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆWeb Vulnerability Resource - XSS
Unferstanding XSS Attack
https://lnkd.in/dg9THu25
XSS Filter Evasion by johnermac
https://lnkd.in/dk_gpSRP
Payloads XSs Evasion by citybasebrooks
https://lnkd.in/d4YQjBxE
XSS Resource by BruteLogic
https://lnkd.in/dcVG-RSX
XSS Challegens
https://lnkd.in/dhcbNe6d
https://lnkd.in/dif8SVjK
How to Find XSS by HackerOne
https://lnkd.in/dvqNm5bT
Learning about Cross Site Scripting (XSS)
https://lnkd.in/dYETX2VV
XSS CheatSheet by Portswigger Labs
https://lnkd.in/dAxxwj4
Hacktivity XSS by HackerOne
https://lnkd.in/dNNM86wx
XSS Explained by NahamSec
https://lnkd.in/dJiTs2td
XSS Stored, Blind, Reflected and DOM by InsiderPhD
https://lnkd.in/d9KzwBfd
Web Hacking Beyond Alert by Wild West
https://lnkd.in/djbgjFS8
XSS Tools
XSSTRIKE https://lnkd.in/dJkuhQ4X
Dalfox https://lnkd.in/dp_UnjGM
XSSMap https://lnkd.in/dgfqdEhj
FinDOM XSS https://lnkd.in/dffQm67D
Ref: Joas A SantosJoas A Santos
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Unferstanding XSS Attack
https://lnkd.in/dg9THu25
XSS Filter Evasion by johnermac
https://lnkd.in/dk_gpSRP
Payloads XSs Evasion by citybasebrooks
https://lnkd.in/d4YQjBxE
XSS Resource by BruteLogic
https://lnkd.in/dcVG-RSX
XSS Challegens
https://lnkd.in/dhcbNe6d
https://lnkd.in/dif8SVjK
How to Find XSS by HackerOne
https://lnkd.in/dvqNm5bT
Learning about Cross Site Scripting (XSS)
https://lnkd.in/dYETX2VV
XSS CheatSheet by Portswigger Labs
https://lnkd.in/dAxxwj4
Hacktivity XSS by HackerOne
https://lnkd.in/dNNM86wx
XSS Explained by NahamSec
https://lnkd.in/dJiTs2td
XSS Stored, Blind, Reflected and DOM by InsiderPhD
https://lnkd.in/d9KzwBfd
Web Hacking Beyond Alert by Wild West
https://lnkd.in/djbgjFS8
XSS Tools
XSSTRIKE https://lnkd.in/dJkuhQ4X
Dalfox https://lnkd.in/dp_UnjGM
XSSMap https://lnkd.in/dgfqdEhj
FinDOM XSS https://lnkd.in/dffQm67D
Ref: Joas A SantosJoas A Santos
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
lnkd.in
LinkedIn
This link will take you to a page thatโs not on LinkedIn
๐ฆ[๐
๐๐๐ ๐๐๐๐๐๐๐๐๐ - ๐๐๐๐๐๐ ๐๐๐๐๐๐๐๐๐ ๐๐๐๐๐๐๐]
Whether you are preparing for a certification or need to sharpen your skills for your pentests.
๐คHere is a list of resources ๐ค:
๐๐๐๐ ๐ญ๐จ ๐ฉ๐ซ๐๐๐ญ๐ข๐๐?
๐Set up and AD home lab with this blog post from spookysec:
https://lnkd.in/d-Dt7PBA
๐You also have a script here to set up a Vulnerable AD lab by WazeHell
https://lnkd.in/dyZS6WWr
๐ Check out the dedicated section on Active Directory of PenTips
https://lnkd.in/dhTP_eyt
๐Here is a collection of various common attack scenarios on Microsoft Azure Active Directory by Cloud-Architekt:
https://lnkd.in/dnFfRRMM
๐Julien Provenzano โ๏ธ shared a great document full of resources here:
https://lnkd.in/d-skx-R3
๐Finally here is an Active Directory Exploitation Cheat Sheet by Integration-IT
https://lnkd.in/dBijrUjT
Resources Credit : Gabrielle
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Whether you are preparing for a certification or need to sharpen your skills for your pentests.
๐คHere is a list of resources ๐ค:
๐๐๐๐ ๐ญ๐จ ๐ฉ๐ซ๐๐๐ญ๐ข๐๐?
๐Set up and AD home lab with this blog post from spookysec:
https://lnkd.in/d-Dt7PBA
๐You also have a script here to set up a Vulnerable AD lab by WazeHell
https://lnkd.in/dyZS6WWr
๐ Check out the dedicated section on Active Directory of PenTips
https://lnkd.in/dhTP_eyt
๐Here is a collection of various common attack scenarios on Microsoft Azure Active Directory by Cloud-Architekt:
https://lnkd.in/dnFfRRMM
๐Julien Provenzano โ๏ธ shared a great document full of resources here:
https://lnkd.in/d-skx-R3
๐Finally here is an Active Directory Exploitation Cheat Sheet by Integration-IT
https://lnkd.in/dBijrUjT
Resources Credit : Gabrielle
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
security_SOC_2025.pdf
647.9 KB
๐ฆ SOC Architectures & Frameworks: Key to Cybersecurity! ๐จ
As cyber threats grow, choosing the right Security Operations Center (SOC) and framework is crucial. Hereโs a quick guide:
SOC Architectures:
Centralized SOC: One location, best for large organizations.
Decentralized SOC: Multiple locations, ideal for global companies.
Virtual SOC: Cloud-based, cost-effective for SMBs.
Hybrid SOC: Combines all models, offering flexibility.
Popular Frameworks:
NIST CSF: Risk-based, customizable.
MITRE ATT&CK: Helps improve threat detection.
ISO 27001: Compliance-focused, globally recognized.
CIS Controls: Simple, prioritized security controls.
Key Considerations: Budget, company size, risk level, and compliance needs. Make the right choice to protect your organization!
Ref: in pdf
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
As cyber threats grow, choosing the right Security Operations Center (SOC) and framework is crucial. Hereโs a quick guide:
SOC Architectures:
Centralized SOC: One location, best for large organizations.
Decentralized SOC: Multiple locations, ideal for global companies.
Virtual SOC: Cloud-based, cost-effective for SMBs.
Hybrid SOC: Combines all models, offering flexibility.
Popular Frameworks:
NIST CSF: Risk-based, customizable.
MITRE ATT&CK: Helps improve threat detection.
ISO 27001: Compliance-focused, globally recognized.
CIS Controls: Simple, prioritized security controls.
Key Considerations: Budget, company size, risk level, and compliance needs. Make the right choice to protect your organization!
Ref: in pdf
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
medium_com_aitichoumustapha_lab_15_practical_malware_analysis_discover.pdf
3.6 MB
๐๐๐ 15 ๐๐ซ๐๐๐ญ๐ข๐๐๐ฅ ๐๐๐ฅ๐ฐ๐๐ซ๐ ๐๐ง๐๐ฅ๐ฒ๐ฌ๐ข๐ฌ: ๐๐ข๐ฌ๐๐จ๐ฏ๐๐ซ ๐๐ง๐ญ๐ข-๐๐ข๐ฌ๐๐ฌ๐ฌ๐๐ฆ๐๐ฅ๐ฒ ๐๐๐๐ก๐ง๐ข๐ช๐ฎ๐๐ฌ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆWebshell Testing for Defenders ๐ก
Having automated tools to spin up web servers isnโt just convenientโitโs a game-changer for defenders. Here's why:
๐ Detection Opportunities:
Use these servers to validate analytic coverage for:
๐ File modifications (webshell uploads)
โ๏ธ Process executions (commands from shells)
๐ฏ Suspicious behaviors triggered by shells
๐ป How to Use:
1๏ธโฃ Deploy your favorite tools (Sysmon, EDR, XDR, etc.)
2๏ธโฃ Grab a webshell of choice, upload it, and start testing!
3๏ธโฃObserve logs, alerts, and behaviors to identify gaps in your coverage.
๐ฅ Tools for Testing:
โก๏ธ Apache Builder: https://github.com/MHaggis/notes/tree/master/utilities/ApachePHPBuild
โก๏ธ IIS Builder: https://github.com/MHaggis/notes/tree/master/utilities/IISBuilder
Ref: Michael H.Michael H.
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Having automated tools to spin up web servers isnโt just convenientโitโs a game-changer for defenders. Here's why:
๐ Detection Opportunities:
Use these servers to validate analytic coverage for:
๐ File modifications (webshell uploads)
โ๏ธ Process executions (commands from shells)
๐ฏ Suspicious behaviors triggered by shells
๐ป How to Use:
1๏ธโฃ Deploy your favorite tools (Sysmon, EDR, XDR, etc.)
2๏ธโฃ Grab a webshell of choice, upload it, and start testing!
3๏ธโฃObserve logs, alerts, and behaviors to identify gaps in your coverage.
๐ฅ Tools for Testing:
โก๏ธ Apache Builder: https://github.com/MHaggis/notes/tree/master/utilities/ApachePHPBuild
โก๏ธ IIS Builder: https://github.com/MHaggis/notes/tree/master/utilities/IISBuilder
Ref: Michael H.Michael H.
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
Forwarded from Exploiting Crew (Pr1vAt3)
๐ฆ Zero Trust Security: The Future of Cyber Defense ๐
In todayโs rapidly evolving digital landscape, protecting organizational assets requires a fundamental shift in how we approach security. Zero Trust Security has emerged as a game-changing framework designed to minimize risks and protect against sophisticated cyber threats.
Hereโs a quick Zero Trust Security Cheatsheet to break it down:
๐ What is Zero Trust?
Itโs a security model based on the principle of "Never Trust, Always Verify." Every user, device, and application must continuously prove their identity and intent, regardless of whether they are inside or outside the network.
๐ Key Pillars of Zero Trust:
1๏ธโฃ Authentication Types:
๐ป Single-Factor Authentication (SFA): Basic, but less secure.
๐ป Multi-Factor Authentication (MFA): A core requirement for enhanced security.
2๏ธโฃ Verticals Leveraging Zero Trust:
๐ป Banking & Financial Services
๐ป Government & Defense
๐ป IT & Healthcare
๐ป Retail, E-commerce, and more.
3๏ธโฃ Top Technologies and Applications:
๐ป Technologies: Microsegmentation, Zero Trust Network Access (ZTNA), MFA, Secure Access Service Edge (SASE).
๐ป Applications: AI-powered analytics, Identity & Access Management (IAM), Endpoint Security, and Network Access Control (NAC).
4๏ธโฃ Core Security Areas:
๐ป Application Security: Safeguarding web apps and APIs with tools like WAF and runtime protection.
๐ป Cloud Security: Using CASB, CIAM, and CDLP to monitor cloud environments.
๐ป IoT Security: Securing IoT devices with firewalls and device management.
๐ป Data Security: Preventing breaches with DLP, encryption, and data masking.
๐ป Network Security: Employing IDS, IPS, and segmentation to protect networks.
Ref: Fadi Kazdar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ
In todayโs rapidly evolving digital landscape, protecting organizational assets requires a fundamental shift in how we approach security. Zero Trust Security has emerged as a game-changing framework designed to minimize risks and protect against sophisticated cyber threats.
Hereโs a quick Zero Trust Security Cheatsheet to break it down:
๐ What is Zero Trust?
Itโs a security model based on the principle of "Never Trust, Always Verify." Every user, device, and application must continuously prove their identity and intent, regardless of whether they are inside or outside the network.
๐ Key Pillars of Zero Trust:
1๏ธโฃ Authentication Types:
๐ป Single-Factor Authentication (SFA): Basic, but less secure.
๐ป Multi-Factor Authentication (MFA): A core requirement for enhanced security.
2๏ธโฃ Verticals Leveraging Zero Trust:
๐ป Banking & Financial Services
๐ป Government & Defense
๐ป IT & Healthcare
๐ป Retail, E-commerce, and more.
3๏ธโฃ Top Technologies and Applications:
๐ป Technologies: Microsegmentation, Zero Trust Network Access (ZTNA), MFA, Secure Access Service Edge (SASE).
๐ป Applications: AI-powered analytics, Identity & Access Management (IAM), Endpoint Security, and Network Access Control (NAC).
4๏ธโฃ Core Security Areas:
๐ป Application Security: Safeguarding web apps and APIs with tools like WAF and runtime protection.
๐ป Cloud Security: Using CASB, CIAM, and CDLP to monitor cloud environments.
๐ป IoT Security: Securing IoT devices with firewalls and device management.
๐ป Data Security: Preventing breaches with DLP, encryption, and data masking.
๐ป Network Security: Employing IDS, IPS, and segmentation to protect networks.
Ref: Fadi Kazdar
@UndercodeCommunity
โ โ โ U๐๐ปโบ๐ซฤ๐ฌ๐โ โ โ โ