UNDERCODE TESTING
306 subscribers
311 photos
24 videos
173 files
29.4K links
🦑 World first platform which Collect & Analyzes every New hacking method.

+ Free AI Practice.

(New Bug Bounty Methods, Tools Updates, AI & Courses).

Services: Undercode.help/services

youtube.com/undercode

@Undercode_Testing
Download Telegram
HACKERS ONLY:

Essential Ports for Network Protocols & Services

HTTP (80) & HTTPS (443) - Web traffic essentials.
SSH (22) - Secure remote access.
FTP (21) - File transfers made easy.
DNS (53) - Resolving domain names.
MySQL (3306) - Database connectivity.
Kubernetes API (6443) - Managing containerized applications.
Docker Daemon API (2375/2376) - Container management and orchestration.

MongoDB (27017) - NoSQL database operations.
NGINX (80/443) - Web server flexibility.
Grafana (3000) & Prometheus (9090) - Monitoring and visualization.
Tomcat (8080) & Apache Kafka (9092) - Application server and messaging.
Redis (6379) - In-memory data structure store.

RDP (3389) - Remote desktop protocol for Windows.
ElasticSearch API (9200) - Search engine capabilities.
Jenkins (8080) - Continuous integration and delivery.
SMTP (25) - Email services.

Source:
https://www.linkedin.com/posts/ibrahim-mahamat-adoum-654413180_networking-itsecurity-devops-activity-7261381940568641537-MW0C?utm_source=share&utm_medium
🎩 Pro's Acts
(Source: Linkedin)
Now it's Free Limited, Official Cisco Intrusion Detection & Prevention course:

YOU Will Learn:

Describe Cisco Secure Firewall Threat Defense

Describe Cisco Secure Firewall

Threat Defense Deployment Options

Describe management options for Cisco Secure Firewall Threat Defense

Configure basic initial settings on Cisco Secure Firewall Threat Defense

Configure high availability on Cisco

Secure Firewall Threat Defense

Configure basic Network Address

Translation on Cisco Secure

Firewall Threat Defense

Describe Cisco Secure Firewall Threat Defense policies and explain how different policies influence packet processing through the device

Configure Discovery Policy on Cisco Secure Firewall Threat Defense

Configure and explain prefilter and tunnel rules in prefilter policy
Configure an access control policy on Cisco Secure Firewall Threat Defense

Configure security intelligence on Cisco Secure Firewall Threat Defense

Configure file policy on Cisco Secure Firewall Threat Defense
Configure Intrusion Policy on Cisco Secure Firewall Threat Defense
Perform basic threat analysis using Cisco Secure Firewall Management Center

Perform basic management and system administration tasks on Cisco Secure Firewall Threat Defense

Perform basic traffic flow troubleshooting on Cisco Secure Firewall Threat Defense

Manage Cisco Secure Firewall Threat Defense with Cisco Secure Firewall Threat Defense Manager

ACCESS:

https://www.linkedin.com/learning/cisco-network-security-intrusion-detection-and-prevention/what-you-should-know
A good crypto trading bot:

> https://github.com/freqtrade/freqtrade <
Forwarded from UNDERCODE COMMUNITY (dvm)
What is the Tor Nodes Safety Level in 2024 ?
Final Results
71%
1% unsecure
0%
50%
14%
90% Anonymous
14%
Happy new year (I'm a beginer)😊
What operating system does your AirPods run?

Sounds like a weird question.
Until you realize you have the equivalent processing power of an iPhone 4 in each ear.🙈

Bluetooth audio SoCs are seldom talked about, but a fascinating field.

AirPods specifically run RTKit, a Real-time Operating System targeting small ARM chips, written mostly in C++.

Small Real-time os(s) are often used in audio devices and peripherals, as the slightest hiccup in scheduling would be immediately (aka audibly) obvious. Timings are extremely tight.

Much of the public knowledge about RTKit comes from the Asahi Linux project.
RTKit firmware is actually bundled into iOS updates; a simple extraction of the firmware will show numerous .im4p files (which are really just packed Mach-O).
Enable Security Defaults in Microsoft Entra ID:

1. Sign in to Microsoft Entra admin center

2. Expand Identity

3. Select Overview

4. Click on Properties

5. Select Manage security defaults

6. Set Security defaults to Enabled

7.Click Save

Note: If your organization uses Conditional Access policies, you are prevented from enabling Security Defaults. You can use Conditional Access to configure custom policies that enable the same behavior 1 as those provided by Security Defaults.